Upload
vuanh
View
414
Download
32
Embed Size (px)
Citation preview
Cisco IOS Debug Command Reference - Commands A through D
Americas HeadquartersCisco Systems, Inc.170 West Tasman DriveSan Jose, CA 95134-1706USAhttp://www.cisco.comTel: 408 526-4000 800 553-NETS (6387)Fax: 408 527-0883
THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS,INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND,EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS.
THE SOFTWARE LICENSE AND LIMITEDWARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITHTHE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY,CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY.
The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB's public domain versionof the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California.
NOTWITHSTANDINGANYOTHERWARRANTYHEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS"WITH ALL FAULTS.CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OFMERCHANTABILITY, FITNESS FORA PARTICULAR PURPOSEANDNONINFRINGEMENTORARISING FROMACOURSEOFDEALING, USAGE, OR TRADE PRACTICE.
IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUTLIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERSHAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
Any Internet Protocol (IP) addresses and phone numbers used in this document are not intended to be actual addresses and phone numbers. Any examples, command display output, networktopology diagrams, and other figures included in the document are shown for illustrative purposes only. Any use of actual IP addresses or phone numbers in illustrative content is unintentionaland coincidental.
Cisco and the Cisco logo are trademarks or registered trademarks of Cisco and/or its affiliates in the U.S. and other countries. To view a list of Cisco trademarks, go to this URL: http://www.cisco.com/go/trademarks. Third-party trademarks mentioned are the property of their respective owners. The use of the word partner does not imply a partnershiprelationship between Cisco and any other company. (1110R)
© 2016 Cisco Systems, Inc. All rights reserved.
C O N T E N T S
C H A P T E R 1 debug aaa accounting through debug auto-config 1
debug aaa accounting through debug auto-config 1
debug aaa accounting 2
debug aaa authentication 3
debug aaa authorization 4
debug aaa cache filterserver 7
debug aaa cache group 9
debug aaa common-criteria 10
debug aaa dead-criteria transaction 11
debug aaa per-user 13
debug aaa pod 14
debug aaa redundancy 16
debug aaa sg-server selection 22
debug aaa test 25
debug acircuit 27
debug acircuit checkpoint 30
debug adjacency 32
debug adjacency (vasi) 35
debug alarm-interface 36
debug alps ascu 38
debug alps circuit event 42
debug alps peer 44
debug alps peer event 46
debug alps snmp 47
debug ancp 48
debug appfw 52
debug apple arp 54
debug apple domain 55
Cisco IOS Debug Command Reference - Commands A through D iii
debug apple eigrp-all 57
debug apple errors 59
debug apple events 61
debug apple nbp 64
debug apple packet 67
debug apple remap 69
debug apple routing 71
debug apple zip 73
debug appn all 75
debug appn cs 77
debug appn ds 79
debug appn hpr 81
debug appn ms 83
debug appn nof 85
debug appn pc 87
debug appn ps 89
debug appn scm 91
debug appn ss 93
debug appn trs 95
debug arap 97
debug archive config timestamp 99
debug archive log config persistent 101
debug archive versioning 103
debug arp 105
debug ase 109
debug asnl events 111
debug asp packet 113
debug aspp event 115
debug aspp packet 117
debug async async-queue 119
debug atm autovc 120
debug atm bundle error 122
debug atm bundle events 123
debug atm cell-packing 125
debug atm events 127
Cisco IOS Debug Command Reference - Commands A through Div
Contents
debug atm ha-error 130
debug atm ha-events 132
debug atm ha-state 133
debug atm l2transport 134
debug atm lfi 136
debug atm native 138
debug atm nbma 140
debug atm oam cc 141
debug atm oc3 pom 143
debug atm t3e3 149
debug audit 155
debug authentication 157
debug auto-config 159
debug auto-ip-ring 161
debug autoupgrade 163
C H A P T E R 2 debug backhaul-session-manager session through debug channel packets 165
debug backhaul-session-manager session through debug channel packets 165
debug backhaul-session-manager session 166
debug backhaul-session-manager set 169
debug backup 171
debug bert 172
debug bfd 173
debug bgp ipv6 dampening 179
debug bgp ipv6 updates 182
debug bgp l2vpn evpn updates 185
debug bgp l2vpn vpls updates 187
debug bgp nsap 189
debug bgp nsap dampening 191
debug bgp nsap updates 194
debug bgp vpnv6 unicast 196
debug bri-interface 197
debug bsc event 199
debug bsc packet 200
debug bstun events 201
Cisco IOS Debug Command Reference - Commands A through D v
Contents
debug bstun packet 203
debug bundle errors 204
debug bundle events 205
debug call-home diagnostic-signature 206
debug call-mgmt 209
debug call fallback detail 212
debug call fallback probe 214
debug call filter detail 216
debug call filter inout 218
debug call rsvp-sync events 221
debug call rsvp-sync func-trace 223
debug call threshold 225
debug call treatment action 226
debug callback 227
debug capf-server 228
debug cas 230
debug ccaal2 session 233
debug cce dp named-db urlfilter 235
debug ccfrf11 session 237
debug cch323 239
debug cch323 capacity 252
debug cch323 h225 255
debug cch323 h245 258
debug cch323 preauth 261
debug cch323 ras 263
debug cch323 video 266
debug ccm-manager 268
debug ccsip all 274
debug ccsip calls 282
debug ccsip dhcp 285
debug ccsip error 289
debug ccsip events 292
debug ccsip feature 294
debug ccsip info 296
debug ccsip level 299
Cisco IOS Debug Command Reference - Commands A through Dvi
Contents
debug ccsip media 300
debug ccsip messages 302
debug ccsip non-call 307
debug ccsip preauth 308
debug ccsip states 310
debug ccsip transport 312
debug ccswvoice vo-debug 315
debug ccswvoice vofr-debug 317
debug ccswvoice vofr-session 319
debug ccswvoice vo-session 321
debug cdapi 322
debug cdma pdsn a10 ahdlc 326
debug cdma pdsn a10 gre 327
debug cdma pdsn a10 ppp 329
debug cdma pdsn a11 331
debug cdma pdsn accounting 334
debug cdma pdsn accounting flow 336
debug cdma pdsn accounting time-of-day 337
debug cdma pdsn cluster 338
debug cdma pdsn ipv6 339
debug cdma pdsn prepaid 340
debug cdma pdsn qos 341
debug cdma pdsn resource-manager 342
debug cdma pdsn selection 343
debug cdma pdsn service-selection 345
debug cdma pdsn session 346
debug cdp 347
debug cdp ip 349
debug cef 351
debug cell-hwic driver 355
debug cell-hwic firmware 357
debug cellular messages all 358
debug cellular messages async 360
debug cellular messages data 362
debug cellular messages dm 364
Cisco IOS Debug Command Reference - Commands A through D vii
Contents
debug cellular messages management 366
debug cellular messages 367
debug cellular messages sms 369
debug cell-hwic virt-con 370
debug cem ls errors 372
debug cem ls events 373
debug ces-conn 374
debug cfm 375
debug channel events 377
debug channel ilan 379
debug channel love 381
debug channel packets 382
C H A P T E R 3 debug clns esis events through debug dbconn tcp 385
debug clns esis events through debug dbconn tcp 385
debug clns esis events 386
debug clns esis packets 387
debug clns events 389
debug clns igrp packets 390
debug clns packet 392
debug clns routing 393
debug cls message 394
debug cls vdlc 395
debug cme-xml 397
debug cns config 398
debug cns events 400
debug cns exec 402
debug cns image 404
debug cns management 405
debug cns xml 407
debug cns xml-parser 409
debug compress 411
debug condition 413
debug condition application voice 417
debug condition glbp 419
Cisco IOS Debug Command Reference - Commands A through Dviii
Contents
debug condition interface 421
debug condition match-list 425
debug condition standby 427
debug condition voice-port 429
debug condition vrf 431
debug condition xconnect 432
debug configuration lock 435
debug confmodem 437
debug conn 438
debug content-scan 439
debug control-plane 442
debug cops 445
debug cot 448
debug cpp event 451
debug cpp negotiation 453
debug cpp packet 455
debug credentials 457
debug crm 459
debug crypto ace b2b 462
debug crypto ace boot 463
debug crypto ace cfgmon 464
debug crypto ace congestion-mgr 465
debug crypto ace dpd 466
debug crypto ace error 467
debug crypto ace hapi 468
debug crypto ace ikea 469
debug crypto ace invspi 470
debug crypto ace ipd 471
debug crypto ace mace 472
debug crypto ace pcp 473
debug crypto ace polo 474
debug crypto ace propcfg 475
debug crypto ace qos 476
debug crypto ace rcon 477
debug crypto ace redundancy 478
Cisco IOS Debug Command Reference - Commands A through D ix
Contents
debug crypto ace spi 479
debug crypto ace stats 480
debug crypto ace syslog 481
debug crypto ace tftp 482
debug crypto ace topn 483
debug crypto ace warning 484
debug crypto condition unmatched 485
debug crypto ctcp 487
debug crypto engine 488
debug crypto engine accelerator logs 490
debug crypto engine ism-vpn 492
debug crypto engine ism-vpn ssl 494
debug crypto engine ism-vpn traffic 496
debug crypto engine ism-vpn traffic selector 498
debug crypto error 500
debug crypto gdoi 502
debug crypto gdoi condition 506
debug crypto ha 508
debug crypto ipv6 ipsec 510
debug crypto ipv6 packet 512
debug crypto ikev2 514
debug crypto ipsec 516
debug crypto ipsec client ezvpn 519
debug crypto ipsec ha 522
debug crypto isakmp 525
debug crypto isakmp ha 528
debug crypto key-exchange 530
debug crypto mib 531
debug crypto pki messages 533
debug crypto pki server 535
debug crypto pki transactions 537
debug crypto provisioning 539
debug crypto sesmgmt 541
debug csm neat 543
debug csm tgrm 550
Cisco IOS Debug Command Reference - Commands A through Dx
Contents
debug csm voice 552
debug ctl-client 558
debug ctunnel 559
debug custom-queue 560
debug cwmp 561
debug cws 562
debug dampening 564
debug data-store 566
debug data-store detail 567
debug dbconn all 569
debug dbconn appc 570
debug dbconn config 572
debug dbconn drda 574
debug dbconn event 576
debug dbconn tcp 578
C H A P T E R 4 debug decnet adj through debug dss ipx event 581
debug decnet adj through debug dss ipx event 581
debug decnet adj 582
debug decnet connects 584
debug decnet events 586
debug decnet packet 587
debug decnet routing 588
debug device-sensor 589
debug dhcp 591
debug dhcp redundancy 595
debug dialer events 596
debug dialer forwarding 598
debug dialer map 600
debug dialpeer 602
debug diameter 605
debug dlsw 610
debug dmsp doc-to-fax 619
debug dmsp fax-to-doc 621
debug dmvpn 623
Cisco IOS Debug Command Reference - Commands A through D xi
Contents
debug dmvpn condition 627
debug dot11 630
debug dot11 aaa 632
debug dot11 cac 635
debug dot11 dot11radio 637
debug dot11 ids 640
debug dot11 ids mfp 642
debug dot1x 644
debug dot1x (EtherSwitch) 646
debug drip event 648
debug drip packet 650
debug dsc clock 652
debug dsip 654
debug dspapi 656
debug dspfarm 658
debug dspu activation 661
debug dspu packet 663
debug dspu state 665
debug dspu trace 667
debug dss ipx event 669
Cisco IOS Debug Command Reference - Commands A through Dxii
Contents
debug aaa accounting through debug auto-config
• debug aaa accounting through debug auto-config, page 1
debug aaa accounting through debug auto-config
Cisco IOS Debug Command Reference - Commands A through D 1
debug aaa accountingTo display information on accountable events as they occur , use the debugaaaaccounting command inprivileged EXEC mode. To disable debugging output, use the no form of this command.
debug aaa accounting
no debug aaa accounting
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines The information displayed by the debugaaaaccounting command is independent of the accounting protocolused to transfer the accounting information to a server. Use the debugtacacs and debugradius protocol-specificcommands to get more detailed information about protocol-level issues.
You can also use the showaccountingcommand to step through all active sessions and to print all the accountingrecords for actively accounted functions. The showaccounting command allows you to display the active"accountable events" on the system. It provides systems administrators a quick look at what is happening,and may also be useful for collecting information in the event of a data loss of some kind on the accountingserver. The showaccounting command displays additional data on the internal state of the authentication,authorization, and accounting (AAA) security system if debugaaaaccounting is turned on as well.
Examples The following is sample output from the debugaaaaccounting command:
Router# debug aaa accounting
16:49:21: AAA/ACCT: EXEC acct start, line 1016:49:32: AAA/ACCT: Connect start, line 10, glare16:49:47: AAA/ACCT: Connection acct stop:task_id=70 service=exec port=10 protocol=telnet address=172.31.3.78 cmd=glare bytes_in=308bytes_out=76 paks_in=45 paks_out=54 elapsed_time=14
Related Commands DescriptionCommand
Displays information on accountable events as theyoccur.
debug aaa authentication
Displays information on AAA/TACACS+authorization.
debug aaa authorization
Displays information associated with the RADIUS.debug radius
Displays information associated with the TACACS.debug tacacs
Cisco IOS Debug Command Reference - Commands A through D2
debug aaa accounting through debug auto-configdebug aaa accounting
debug aaa authenticationTo display information on authentication, authorization, and accounting (AAA) TACACS+ authentication,use the debugaaaauthentication command in privileged EXEC mode. To disable debugging output, use theno form of this command.
debug aaa authentication
no debug aaa authentication
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This commandwas introduced in a release earlier than Cisco IOS Release15.0(1)M.
15.0(1)M
This commandwas integrated into a release earlier than Cisco IOSRelease12.2(33)SRC.
12.2(33)SRC
This commandwas integrated into a release earlier than Cisco IOSRelease12.2(33)SXI.
12.2(33)SXI
This command was integrated into a release earlier than Cisco IOS XERelease 2.1.
Cisco IOS XE
Release 2.1
Usage Guidelines Use the debugaaaauthentication command to learn the methods of authentication being used.
Examples The following is sample output from the debugaaaauthentication command. A single EXEC login that usesthe "default" method list and the first method, TACACS+, is displayed.
Router# debug aaa authenticationNov 17 03:06:40.805 PST: AAA/BIND(0000000F): Bind i/fNov 17 03:06:40.805 PST: AAA/AUTHEN/LOGIN (0000000F): Pick method list 'default'
Cisco IOS Debug Command Reference - Commands A through D 3
debug aaa accounting through debug auto-configdebug aaa authentication
debug aaa authorizationTo display information on authentication, authorization, and accounting (AAA) TACACS+ authorization,use the debugaaaauthorizationcommand in privileged EXEC mode. To disable debugging output, use theno form of this command.
debug aaa authorization
no debug aaa authorization
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines Use this command to learn the methods of authorization being used and the results of these methods.
Examples The following is sample output from thedebugaaaauthorizationcommand. In this display, an EXECauthorization for user "carrel" is performed. On the first line, the username is authorized. On the second andthird lines, the attribute value (AV) pairs are authorized. The debug output displays a line for each AV pairthat is authenticated. Next, the display indicates the authorization method used. The final line in the displayindicates the status of the authorization process, which, in this case, has failed.
Router# debug aaa authorization2:23:21: AAA/AUTHOR (0): user='carrel'2:23:21: AAA/AUTHOR (0): send AV service=shell2:23:21: AAA/AUTHOR (0): send AV cmd*2:23:21: AAA/AUTHOR (342885561): Method=TACACS+2:23:21: AAA/AUTHOR/TAC+ (342885561): user=carrel2:23:21: AAA/AUTHOR/TAC+ (342885561): send AV service=shell2:23:21: AAA/AUTHOR/TAC+ (342885561): send AV cmd*2:23:21: AAA/AUTHOR (342885561): Post authorization status = FAILThe aaaauthorization command causes a request packet containing a series of AV pairs to be sent to theTACACS+ daemon as part of the authorization process. The daemon responds in one of the following threeways:
• Accepts the request as is
• Makes changes to the request
• Refuses the request, thereby refusing authorization
The table below describes AV pairs associated with the debugaaaauthorization command that may appearin the debug output.
Table 1: Attribute Value Pairs for Authorization
DescriptionAttribute Value
Authorization for the AppleTalk remote access (ARA)protocol is being requested.
service=arap
Cisco IOS Debug Command Reference - Commands A through D4
debug aaa accounting through debug auto-configdebug aaa authorization
DescriptionAttribute Value
Authorization for EXEC startup and commandauthorization is being requested.
service=shell
Authorization for PPP is being requested.service=ppp
Authorization for SLIP is being requested.service=slip
Authorization for LCP is being requested (lower layerof PPP).
protocol=lcp
Used with service=slip to indicate which protocollayer is being authorized.
protocol=ip
Used with service=ppp to indicate which protocollayer is being authorized.
protocol=ipx
Used with service=ppp or service=arap to indicatewhich protocol layer is being authorized.
protocol=atalk
Used with service=ppp for VINES over PPP.protocol=vines
Used for undefined or unsupported conditions.protocol=unknown
Used with service=shell, if cmd=NULL, this is anauthorization request to start an EXEC. If cmd is notNULL, this is a command authorization request andwill contain the name of the command beingauthorized. For example, cmd=telnet.
cmd=x
Usedwith service=shell.When performing commandauthorization, the name of the command is given bya cmd=x pair for each argument listed. For example,cmd-arg=archie.sura.net.
cmd-arg=x
Used with service=shell and service=arap. For ARA,this pair contains an access list number. Forservice=shell, this pair contains an access classnumber. For example, acl=2.
acl=x
Used with service=ppp and protocol=ip. Contains anIP input access list for SLIP or PPP/IP. For example,inacl=2.
inacl=x
Used with service=ppp and protocol=ip. Contains anIP output access list for SLIP or PPP/IP. For example,outacl=4.
outacl=x
Cisco IOS Debug Command Reference - Commands A through D 5
debug aaa accounting through debug auto-configdebug aaa authorization
DescriptionAttribute Value
Usedwith service=slip, service=ppp, and protocol=ip.Contains the IP address that the remote host shoulduse when connecting via SLIP or PPP/IP. Forexample, addr=172.30.23.11.
addr=x
Usedwith service=slip, service=ppp, and protocol=ip.Equivalent in function to the /routing flag in SLIPand PPP commands. Can either be true or false. Forexample, routing=true.
routing=x
Used with service=arap. The number of minutesbefore an ARA session disconnects. For example,timeout=60.
timeout=x
Used with service=shell and cmd=NULL. Specifiesan autocommand to be executed at EXEC startup. Forexample, autocmd=telnet yxz.com.
autocmd=x
Used with service=shell and cmd=NULL. Specifiesa noescape option to the username configurationcommand. Can be either true or false. For example,noescape=true.
noescape=x
Used with service=shell and cmd=NULL. Specifiesa nohangup option to the username configurationcommand. Can be either true or false. For example,nohangup=false.
nohangup=x
Used with service=shell and cmd=NULL. Specifiesthe current privilege level for command authorizationas a number from 0 to 15. For example, priv-lvl=15.
priv-lvl=x
Used with service=arap. Specifies an AppleTalkzonelist for ARA. For example, zonelist=5.
zonelist=x
Used with service=ppp and protocol=ip. Specifies thename of a local pool from which to get the addressof the remote host.
addr-pool=x
Cisco IOS Debug Command Reference - Commands A through D6
debug aaa accounting through debug auto-configdebug aaa authorization
debug aaa cache filterserverTo help troubleshoot your filter cache configurations, use the debugaaacachefilterserver command inprivileged EXEC mode. To disable debugging output, use the no form of this command.
debug aaa cache filterserver
no debug aaa cache filterserver
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(13)T
This command was integrated into Cisco IOS Release 12.2(28)SB.12.2(28)SB
This command was integrated into Cisco IOS Release 12.2(33)SRC.12.2(33)SRC
Examples The following is sample output from the debugaaacachefilterserver command:
Router# debug aaa cache filterserver
AAA/FLTSV: need "myfilter" (fetch), call 0x612DAC64AAA/FLTSV: send req, call 0x612DAC50AAA/FLTSV: method SERVER_GROUP myradiusAAA/FLTSV: recv reply, call 0x612DAC50 (PASS)AAA/FLTSV: create cacheAAA/FLTSV: add attr "call-inacl"AAA/FLTSV: add attr "call-inacl"AAA/FLTSV: add attr "call-inacl"AAA/FLTSV: skip attr "filter-cache-refresh"AAA/FLTSV: skip attr "filter-cache-time"AAA/CACHE: set "AAA filtserv cache" entry "myfilter" refresh? noAAA/CACHE: set "AAA filtserv cache" entry "myfilter" cachetime 15AAA/FLTSV: add attr to list "call-inacl" call 0x612DAC64AAA/FLTSV: add attr to list "call-inacl" call 0x612DAC64AAA/FLTSV: add attr to list "call-inacl" call 0x612DAC64AAA/FLTSV: PASS call 0x612DAC64AAA/CACHE: timer "AAA filtserv cache", next in 10 secs (0 entries)AAA/CACHE: timer "AAA filtserv cache", next in 10 secs (1 entry)AAA/CACHE: destroy "AAA filtserv cache" entry "myfilter"AAA/CACHE: timer "AAA filtserv cache", next in 10 secs (0 entries)
Cisco IOS Debug Command Reference - Commands A through D 7
debug aaa accounting through debug auto-configdebug aaa cache filterserver
Related Commands DescriptionCommand
Enables AAA authorization caches and thedownloading of ACL configurations from a RADIUSfilter server.
aaa authorization cache filterserver
Cisco IOS Debug Command Reference - Commands A through D8
debug aaa accounting through debug auto-configdebug aaa cache filterserver
debug aaa cache groupTo debug the caching mechanism and ensure that entries are cached from authentication, authorization, andaccounting (AAA) server responses and found when queried, use the debugaaacachegroup command inprivileged EXEC mode.
debug aaa cache group
Syntax Description This command has no arguments or keywords.
Command Default Debug information for all cached entries is displayed.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(28)SB
This command was integrated into Cisco IOS Release 12.2(33)SRC.12.2(33)SRC
This command was integrated into Cisco IOS Release 15.0(1)M.15.0(1)M
Usage Guidelines Use this command to display debug information about cached entries.
Examples The following example displays the debug information about all cached entries:
Router# debug aaa cache group
Related Commands DescriptionCommand
Clears an individual entry or all entries in the cache.clear aaa cache group
Displays cache entries stored by the AAA cache.show aaa cache group
Cisco IOS Debug Command Reference - Commands A through D 9
debug aaa accounting through debug auto-configdebug aaa cache group
debug aaa common-criteriaTo troubleshoot authentication, authorization, and accounting (AAA) common criteria password securitypolicy information, use the debug aaa common-criteria command in privileged EXEC mode. To disabledebugging output, use the no form of this command.
debug aaa common-criteria
no debug aaa common-criteria
Syntax Description This command has no arguments or keywords.
Command Default Conditional debugging for this command is disabled.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.15.0(2)SE
Usage Guidelines Use this command to display debug information about AAA common criteria policies.
Examples The following example displays the debug information about AAA common criteria:
Device> enableDevice# debug aaa common-criteriaAAA common-criteria debugs debugging is on*Aug 6 08:21:06.554: AAA CC: User flags:2,Policy flags:4*Aug 6 08:21:06.554: AAA CC: Increment ref count to 1 for test*Aug 6 08:21:06.554: AAA CC: User test linked to CC policy test
Related Commands DescriptionCommand
Configures a AAA common criteria security policy.aaa common-criteria policy
Displays common criteria security policy details.show aaa common-criteria policy
Cisco IOS Debug Command Reference - Commands A through D10
debug aaa accounting through debug auto-configdebug aaa common-criteria
debug aaa dead-criteria transactionTo display authentication, authorization, and accounting (AAA) dead-criteria transaction values, use thedebugaaadead-criteriatransactioncommand in privileged EXECmode. To disable dead-criteria debugging,use the no form of this command.
debug aaa dead-criteria transaction
no debug aaa dead-criteria transaction
Syntax Description This command has no arguments or keywords.
Command Default If the command is not configured, debugging is not turned on.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.3(6)
This commandwas integrated into Cisco IOSRelease 12.3(7)T. The commandoutput includes two new fields: Current Tries and Elapsed Time.
12.3(7)T
Usage Guidelines Dead-criteria transaction values may change with every AAA transaction. Some of the values that can bedisplayed are estimated outstanding transaction, retransmit tries, and dead-detect intervals. These values areexplained in the table below.
Examples The following example shows dead-criteria transaction information for a particular server group:
Router# debug aaa dead-criteria transactionAAA Transaction debugs debugging is on*Nov 14 23:44:17.403: AAA/SG/TRANSAC: Computed Retransmit Tries: 10, Current Tries: 3,Current Max Tries: 10*Nov 14 23:44:17.403: AAA/SG/TRANSAC: Computed Dead Detect Interval: 10s, Elapsed Time:317s, Current Max Interval: 10s*Nov 14 23:44:17.403: AAA/SG/TRANSAC: Estimated Outstanding Transaction: 6, Current MaxTransaction: 6The table below describes the significant fields shown in the display.
Table 2: debug aaa dead-criteria transaction Field Descriptions
DescriptionField
AAA server-group transaction.AAA/SG/TRANSAC
Cisco IOS Debug Command Reference - Commands A through D 11
debug aaa accounting through debug auto-configdebug aaa dead-criteria transaction
DescriptionField
Currently computed number of retransmissions beforethe server is marked as dead.
Computed Retransmit Tries
Number of successive failures since the last validresponse.
Current Tries
Maximum number of tries since the last successfultransaction.
Current Max Tries
Period of inactivity (the number of seconds since thelast successful transaction) that can elapse before theserver is marked as dead. The period of inactivitystarts when a transaction is sent to a server that isconsidered live. The dead-detect interval is the periodthat the router waits for responses from the serverbefore the router marks the server as dead.
Computed Dead Detect Interval
Amount of time that has elapsed since the last validresponse.
Elapsed Time
Maximumperiod of inactivity since the last successfultransaction.
Current Max Interval
Estimated number of transaction that are associatedwith the server.
Estimated Outstanding Transaction
Maximum transaction since the last successfultransaction.
Current Max Transaction
Related Commands DescriptionCommand
Forces one or both of the criteria--used to mark aRADIUS server as dead--to be the indicated constant.
radius-server dead-criteria
Displays dead-criteria detection information for anAAA server.
show aaa dead-criteria
Cisco IOS Debug Command Reference - Commands A through D12
debug aaa accounting through debug auto-configdebug aaa dead-criteria transaction
debug aaa per-userTo display debugging information about PPP session per-user activities, use thedebugaaaper-usercommandin privileged EXEC mode. To turn off debugging, use the no form of this command.
debug aaa per-user
no debug aaa per-user
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationRelease
This command has existed since Cisco IOS Release 11.3 T.11.3 T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines The per-user module is responsible for installing per-user attributes for PPP sessions.
Examples The following example displays the configuration commands that were generated by the per-user process:
Router# debug aaa per-userAAA/PER-USER: line=[ip access-list standard Virtual-Access2#31]AAA/PER-USER: line=[deny 10.0.0.2 0.0.0.0]AAA/PER-USER: line=[permit any]The fields in the display are self-explanatory.
Related Commands DescriptionCommand
Displays information on AAA TACACS+authorization.
debug aaa authorization
Displays information on traffic and exchanges in aninternetwork implementing the PPP.
debug ppp
Displays information associated with RADIUS.debug radius
Displays information associated with TACACS.debug tacacs
Cisco IOS Debug Command Reference - Commands A through D 13
debug aaa accounting through debug auto-configdebug aaa per-user
debug aaa podTo display debug messages related to packet of disconnect (POD) packets, use the debugaaapod commandin privileged EXEC mode. To disable debugging output, use the no form of this command.
debug aaa pod
no debug aaa pod
Syntax Description This command has no keywords or arguments.
Command Default Debugging for POD packets is not enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.1(3)T
Support for the voice applications as well as support for the Cisco AS5350,Cisco AS5400 and the Cisco 3600 series was added.
12.2(2)XB
Support for the Cisco AS5800 was added.12.2(2)XB1
Support for the Cisco AS5850 was added. This command was integratedinto Cisco IOS Release 12.2(11)T.
12.2(11)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Examples The following example shows output from a successful POD request when using the showdebug command:
Router# debug aaa podAAA POD packet processing debugging is onRouter# show debugGeneral OS:AAA POD packet processing debugging is on
Router#Apr 25 17:15:59.318:POD:172.19.139.206 request queuedApr 25 17:15:59.318:voice_pod_request:Apr 25 17:15:59.318:voip_populate_pod_attr_list:Apr 25 17:15:59.318:voip_pod_get_guid:Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val:Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val:attr_len=50Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val:attr=h323-conf-idApr 25 17:15:59.318:voip_pod_get_vsa_attr_val:attr_len=50 value_len=35Apr 25 17:15:59.318:voip_pod_get_guid:conf-id=FFA7785F F7F607BB00000000 993FB1F4 n_bytes=35Apr 25 17:15:59.318:voip_pod_get_guid:GUID = FFA7785F F7F607BB 00000000993FB1F4Apr 25 17:15:59.318:voip_populate_pod_attr_list:
Cisco IOS Debug Command Reference - Commands A through D14
debug aaa accounting through debug auto-configdebug aaa pod
Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val:Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val:attr_len=23Apr 25 17:15:59.318:voip_pod_get_vsa_attr_val:attr=h323-originateApr 25 17:15:59.318:voip_pod_get_vsa_attr_val:attr_len=23 value_len=6Apr 25 17:15:59.318:voip_get_call_direction:Apr 25 17:15:59.318:voip_get_call_direction:returning answerApr 25 17:15:59.318:voip_eval_pod_attr:Apr 25 17:15:59.318:cc_api_trigger_disconnect:Apr 25 17:15:59.322:POD:Sending ACK to 172.19.139.206/1700Apr 25 17:15:59.322:voip_pod_clean:
Related Commands DescriptionCommand
Enables the POD feature.aaa pod server
Cisco IOS Debug Command Reference - Commands A through D 15
debug aaa accounting through debug auto-configdebug aaa pod
debug aaa redundancyTo display debug output that displays authentication, authorization, and accounting (AAA) redundancy eventsduring session activation, session synchronization to the standby device, and dynamic session updates to thestandby device, use the debugaaaredundancy command in privileged EXEC mode. To disable debuggingfor AAA redundancy, use the no form of this command.
debug aaa redundancy
no debug aaa redundancy
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(31)SB2
This command was integrated into Cisco IOS Release 12.2(33)SRC.12.2(33)SRC
This command was integrated into Cisco IOS Release 12.2(33)SRE.12.2(33)SRE
Usage Guidelines This command displays the AAA synchronization data for the session synchronization to the standby device.This information might be useful for diagnosing any AAA problems related to the session synchronization.
Examples The following example shows sample output from the debugaaaredundancycommand collected while asession is activated and synchronized to the standby device:
Router# debug aaa redundancyLogs on Active==============01:31:55: CCM: New State[Not Ready]01:31:55: CCM: PPPoE Required01:31:55: CCM: PPP Required01:31:55: CCM: LTERM Required01:31:55: CCM: PPPoE is Initiator01:31:55: AAA/BIND(0000000B): Bind i/f Virtual-Template101:31:55: CCM: AAA Ready01:31:55: AAA/CCM/(0000000B): AAA sso init completed successfully01:31:55: SSS INFO: Element type is Access-Type = 3 (PPPoE)01:31:55: SSS INFO: Element type is Protocol-Type = 0 (PPP)01:31:55: SSS INFO: Element type is Media-Type = 1 (Ethernet)01:31:55: SSS INFO: Element type is Switch-Id = 4105 (00001009)01:31:55: SSS INFO: Element type is Segment-Hdl = 4114 (00001012)01:31:55: SSS INFO: Element type is AAA-Id = 11 (0000000B)01:31:55: SSS INFO: Element type is AccIe-Hdl = 33554441 (02000009)01:31:55: SSS INFO: Element type is SHDB-Handle = 1476395017 (58000009)01:31:55: SSS INFO: Element type is Input Interface = "GigabitEthernet6/0/0"01:31:55: SSS MGR [uid:10]: Sending a Session Assert ID Mgr event
Cisco IOS Debug Command Reference - Commands A through D16
debug aaa accounting through debug auto-configdebug aaa redundancy
01:31:55: SSS MGR [uid:10]: Updating ID Mgr with the following keys:aaa-unique-id 11 (0xB)
01:31:55: SSS MGR [uid:10]: Handling Policy Service Authorize action (1 pending sessions)01:31:55: SSS PM [uid:10][63D5D594]: RM/VPDN disabled: RM/VPDN author not needed01:31:55: SSS PM [uid:10][63D5D594]: AAA author needed for registered user01:31:55: SSS MGR [uid:10]: Got reply Need More Keys from PM01:31:55: SSS MGR [uid:10]: Handling Need More Keys action01:31:57: SSS INFO: Element type is Unauth-User = "user1"01:31:57: SSS INFO: Element type is AccIe-Hdl = 33554441 (02000009)01:31:57: SSS INFO: Element type is AAA-Id = 11 (0000000B)01:31:57: SSS INFO: Element type is Access-Type = 0 (PPP)01:31:57: SSS INFO: Element type is Protocol-Type = 0 (PPP)01:31:57: SSS MGR [uid:10]: Sending a Session Update ID Mgr event01:31:57: SSS MGR [uid:10]: Updating ID Mgr with the following keys:username "user1"aaa-unique-id 11 (0xB)
01:31:57: SSS MGR [uid:10]: Handling Policy Send More Keys action01:31:57: SSS PM [uid:10][63D5D594]: AAA author needed for registered user01:31:57: SSS PM [uid:10][63D5D594]: SGBP disabled: SGF author not needed01:31:57: SSS MGR [uid:10]: Got reply Local Terminate from PM01:31:57: SSS MGR [uid:10]: Handling Connect Local Service action01:31:57: SSS MGR [uid:10]: Need the resource type determined key01:31:57: SSS MGR [uid:10]: Handling Need More Keys action01:31:57: SSS MGR [uid:10]: Not yet ready to start the Local service01:31:57: AAA/AUTHEN/PPP (0000000B): Pick method list 'default'01:31:57: RADIUS/ENCODE(0000000B):Orig. component type = PPoE01:31:57: RADIUS: AAA Unsupported Attr: client-mac-address[42] 1401:31:57: RADIUS: 30 30 30 61 2E 34 32 37 64 2E 65 63 [ 000a.427d.ec]01:31:57: RADIUS: AAA Unsupported Attr: interface [171] 701:31:57: RADIUS: 36 2F 30 2F 30 [ 6/0/0]01:31:57: RADIUS(0000000B): Config NAS IP: 0.0.0.001:31:57: RADIUS/ENCODE(0000000B): acct_session_id: 1101:31:57: RADIUS(0000000B): sending01:31:57: RADIUS/ENCODE: Best Local IP-Address 9.2.76.2 for Radius-Server 9.2.36.25301:31:57: RADIUS(0000000B): Send Access-Request to 9.2.36.253:1645 id 1645/10, len 8601:31:57: RADIUS: authenticator FD E8 32 9A 71 15 50 44 - BE FF 19 D0 09 D4 8D 1501:31:57: RADIUS: Framed-Protocol [7] 6 PPP [1]01:31:57: RADIUS: User-Name [1] 9 "user1"01:31:57: RADIUS: User-Password [2] 18 *01:31:57: RADIUS: NAS-Port-Type [61] 6 Virtual [5]01:31:57: RADIUS: NAS-Port [5] 6 001:31:57: RADIUS: NAS-Port-Id [87] 9 "6/0/0/0"01:31:57: RADIUS: Service-Type [6] 6 Framed [2]01:31:57: RADIUS: NAS-IP-Address [4] 6 9.2.76.201:31:57: RADIUS: Received from id 1645/10 9.2.36.253:1645, Access-Accept, len 3201:31:57: RADIUS: authenticator E4 68 43 2C 2F E7 B4 57 - 05 70 FF B1 22 13 E8 0F01:31:57: RADIUS: Idle-Timeout [28] 6 20001:31:57: RADIUS: Service-Type [6] 6 Framed [2]01:31:57: RADIUS(0000000B): Received from id 1645/1001:31:57: SSS INFO: Element type is Auth-User = "user1"01:31:57: SSS INFO: Element type is AAA-Attr-List = C500010001:31:57: SSS INFO: Element type is idletime 200 (0xC8)01:31:57: SSS INFO: Element type is service-type 2 [Framed]01:31:57: SSS INFO: Element type is Resource-Determined = 1 (YES)01:31:57: SSS INFO: Element type is Access-Type = 0 (PPP)01:31:57: SSS INFO: Element type is Protocol-Type = 0 (PPP)01:31:57: SSS INFO: Element type is Final = 1 (YES)01:31:57: SSS MGR [uid:10]: Handling Connect Local Service action01:31:57: SSS MGR [uid:10]: Rcvd an AAA attr list from SIP, pushing it to the PM01:31:57: SSS MGR [uid:10]: Handling Send Policy Push Cng action01:31:57: SSS AAA AUTHOR [uid:10]: Root SIP PPPoE01:31:57: SSS AAA AUTHOR [uid:10]: Enable PPPoE parsing01:31:57: SSS AAA AUTHOR [uid:10]: Enable PPP parsing01:31:57: SSS AAA AUTHOR [uid:10]: Active key set to Unauth-User01:31:57: SSS AAA AUTHOR [uid:10]: Authorizing key user101:31:57: SSS AAA AUTHOR [uid:10]: Spoofed AAA reply sent for key user101:31:57: SSS MGR [uid:10]: Not yet ready to start the Local service01:31:57: SSS AAA AUTHOR [uid:10]: Received an AAA pass01:31:57: SSS AAA AUTHOR [uid:10]: SIP PPP[60A0504C] parsed as Success01:31:57: SSS AAA AUTHOR [uid:10]: SIP PPP[61571560] parsed as Ignore01:31:57: SSS AAA AUTHOR [uid:10]: SIP PPPoE[61599FB0] parsed as Success01:31:57: SSS AAA AUTHOR [uid:10]: SIP Root parser not installed01:31:57: SSS AAA AUTHOR [uid:10]: No service authorization info found
Cisco IOS Debug Command Reference - Commands A through D 17
debug aaa accounting through debug auto-configdebug aaa redundancy
01:31:57: SSS AAA AUTHOR [uid:10]: Active Handle present01:31:57: SSS AAA AUTHOR [uid:10]: Freeing Active Handle; SSS Policy Context Handle =63D5D59401:31:57: SSS AAA AUTHOR [uid:10]: Free request01:31:57: SSS MGR [uid:10]: Got reply Apply Config from PM01:31:57: SSS MGR [uid:10]: Successfully applied policy config01:31:57: SSS MGR [uid:10]: Handling Connect Local Service action01:31:57: CCM: LTERM Required01:31:57: SSS LTERM [uid:10]: Processing Local termination request01:31:57: SSS LTERM [uid:10]: Sent create-clone request to vtemplate manager01:31:57: SSS LTERM [uid:10]: Created vaccess interface Vi301:31:57: CCM: LTERM Ready01:31:57: SSS LTERM [uid:10]: Segment provision successful01:31:57: SSS MGR [uid:10]: Handling Local Service Connected action01:31:57: SSS MGR [uid:10]: Apply for Vi3: segment 4114, owner 382520527701:31:57: SSS MGR [uid:10]: Interface config 212C27B801:31:57: SSS MGR [uid:10]: Per-user config 2146BD4801:31:57: SSS LTERM [uid:10]: Switching session provisioned01:31:57: SSS MGR [uid:10]: Handling Local Service Connected, Features Applied action01:31:57: %LINK-3-UPDOWN: Interface Virtual-Access3, changed state to up01:31:57: SSS LTERM [uid:10]: Installed Vi3 process path switching vector01:31:57: SSS LTERM [uid:10]: Installed Vi3 fastsend path switching vector01:31:57: AAA/BIND(0000000B): Bind i/f Virtual-Access301:31:57: CCM: PPPoE Ready01:31:57: CCM: PPP Ready01:31:57: CCM: PPP Old State[Not Ready] Event[All Ready]01:31:57: CCM: New State[Ready]01:31:57: AAA/CCM/(0000000B): No of sync avps = 4 Total sync data len = 9401:31:57: CCM: PPP Adding Data Type[6] Subtype[0] Length[14]01:31:57: CCM: PPP Adding Data Type[5] Subtype[0] Length[10]01:31:57: CCM: PPP Adding Data Type[8] Subtype[0] Length[6]01:31:57: CCM: PPP Adding Data Type[7] Subtype[0] Length[0]01:31:57: CCM: PPP Adding Data Type[1] Subtype[0] Length[8]01:31:57: CCM: PPP Adding Data Type[41] Subtype[0] Length[4]01:31:57: CCM: PPPoE Adding Data Type[1] Subtype[0] Length[54]01:31:57: CCM: PPPoE Adding Data Type[2] Subtype[0] Length[2]01:31:57: CCM: PPPoE Adding Data Type[5] Subtype[0] Length[4]01:31:57: CCM: PPPoE Adding Data Type[6] Subtype[0] Length[4]01:31:57: CCM: PPPoE Adding Data Type[7] Subtype[0] Length[20]01:31:57: CCM: PPPoE Adding Data Type[8] Subtype[0] Length[16]01:31:57: CCM: AAA Adding Data Type[1] Subtype[0] Length[4]01:31:57: AAA/CCM/(0000000B): Adding sync avp [AAA Unique Id] Length = 401:31:57: CCM: AAA Adding Data Type[2] Subtype[0] Length[2]01:31:57: AAA/CCM/(0000000B): Adding sync avp [AAA Authen Method Index] Length = 201:31:57: CCM: AAA Adding Data Type[3] Subtype[0] Length[4]01:31:57: AAA/CCM/(0000000B): Adding sync avp [AAA Acct Sess id] Length = 401:31:57: CCM: AAA Adding Data Type[4] Subtype[0] Length[84]01:31:57: AAA/CCM/(0000000B): Adding sync avp [AAA Author Data] Length = 8401:31:57: AAA/CCM: Adding author data entry 3201:31:57: CCM: LTERM Adding Data Type[1] Subtype[0] Length[4]01:31:57: SSS LTERM [uid:10]: LTERM segment handle synced01:31:57: CCM: Send[Sync Session] Length[240] NumItems[17] Event[0x0]01:31:57: Client[PPP] Type[6] Subtype[0] Length[14]01:31:57: 01 04 05 D4 03 04 C0 23 05 06 03 F4 37 7901:31:57: Client[PPP] Type[5] Subtype[0] Length[10]01:31:57: 01 04 05 D4 05 06 9A 6B 68 FE01:31:57: Client[PPP] Type[8] Subtype[0] Length[6]01:31:57: 03 06 07 01 01 0101:31:57: Client[PPP] Type[7] Subtype[0] Length[0]01:31:57:01:31:57: Client[PPP] Type[1] Subtype[0] Length[8]01:31:57: 73 75 6D 61 6E 74 68 0001:31:57: Client[PPP] Type[41] Subtype[0] Length[4]01:31:57: 00 00 00 0201:31:57: Client[PPPoE] Type[1] Subtype[0] Length[54]01:31:57: 00 03 A0 10 22 90 00 0A 42 7D EC 38 88 63 11 1901:31:57: 00 00 00 22 01 02 00 06 61 61 61 5F 68 61 01 0401:31:57: 00 10 98 99 BB 6D 59 B8 35 33 0B FB 14 B9 07 EB01:31:57: 83 B4 01 01 00 0001:31:57: Client[PPPoE] Type[2] Subtype[0] Length[2]01:31:57: 00 0A01:31:57: Client[PPPoE] Type[5] Subtype[0] Length[4]01:31:57: 00 00 10 09
Cisco IOS Debug Command Reference - Commands A through D18
debug aaa accounting through debug auto-configdebug aaa redundancy
01:31:57: Client[PPPoE] Type[6] Subtype[0] Length[4]01:31:57: 00 00 10 1201:31:57: Client[PPPoE] Type[7] Subtype[0] Length[20]01:31:57: 00 02 06 00 00 00 A6 B8 00 00 00 00 00 00 00 2A01:31:57: 00 00 FF FF01:31:57: Client[PPPoE] Type[8] Subtype[0] Length[16]01:31:57: 00 00 00 03 00 00 00 00 00 00 00 19 00 00 00 1D01:31:57:01:31:57: Client[AAA] Type[1] Subtype[0] Length[4]01:31:57: 00 00 00 0B01:31:57: Client[AAA] Type[2] Subtype[0] Length[2]01:31:57: 00 0001:31:57: Client[AAA] Type[3] Subtype[0] Length[4]01:31:57: 00 00 00 0B01:31:57: Client[AAA] Type[4] Subtype[0] Length[84]01:31:57: 00 00 00 00 00 00 00 00 63 E8 73 D0 00 00 00 0B01:31:57: 64 02 FE 71 00 00 00 00 00 00 00 00 00 00 00 0001:31:57: 00 00 00 04 00 00 00 01 00 00 00 20 00 00 00 0001:31:57: 58 00 00 09 02 0A 00 20 E4 68 43 2C 2F E7 B4 5701:31:57: 05 70 FF B1 22 13 E8 0F 1C 06 00 00 00 C8 06 0601:31:57: 00 00 00 0201:31:57: Client[LTERM] Type[1] Subtype[0] Length[4]01:31:57: 00 00 20 1301:31:57: CCM: New State[Dyn Sync]01:31:58: %LINEPROTO-5-UPDOWN: Line protocol on Interface Virtual-Access3, changed stateto upLogs on Standby================01:21:16: CCM ISSU: Received negotiation message type [ISSU_RC_USER_MESSAGE_COMP]01:21:16: CCM: Receive[Sync Session] Length[240] NumItems[17] Flags[0x0]01:21:16: CCM: New State[Not Ready]01:21:16: Client[PPP] Type[6] Subtype[0] Length[14]01:21:16: 01 04 05 D4 03 04 C0 23 05 06 03 F4 37 7901:21:16: Client[PPP] Type[5] Subtype[0] Length[10]01:21:16: 01 04 05 D4 05 06 9A 6B 68 FE01:21:16: Client[PPP] Type[8] Subtype[0] Length[6]01:21:16: 03 06 07 01 01 0101:21:16: Client[PPP] Type[7] Subtype[0] Length[0]01:21:16:01:21:16: Client[PPP] Type[1] Subtype[0] Length[8]01:21:16: 73 75 6D 61 6E 74 68 0001:21:16: Client[PPP] Type[41] Subtype[0] Length[4]01:21:16: 00 00 00 0201:21:16: Client[PPPoE] Type[1] Subtype[0] Length[54]01:21:16: 00 03 A0 10 22 90 00 0A 42 7D EC 38 88 63 11 1901:21:16: 00 00 00 22 01 02 00 06 61 61 61 5F 68 61 01 0401:21:16: 00 10 98 99 BB 6D 59 B8 35 33 0B FB 14 B9 07 EB01:21:16: 83 B4 01 01 00 0001:21:16: Client[PPPoE] Type[2] Subtype[0] Length[2]01:21:16: 00 0A01:21:16: Client[PPPoE] Type[5] Subtype[0] Length[4]01:21:16: 00 00 10 0901:21:16: Client[PPPoE] Type[6] Subtype[0] Length[4]01:21:16: 00 00 10 1201:21:16: Client[PPPoE] Type[7] Subtype[0] Length[20]01:21:16: 00 02 06 00 00 00 A6 B8 00 00 00 00 00 00 00 2A01:21:16: 00 00 FF FF01:21:16: Client[PPPoE] Type[8] Subtype[0] Length[16]01:21:16: 00 00 00 03 00 00 00 00 00 00 00 19 00 00 00 1D01:21:16:01:21:16: Client[AAA] Type[1] Subtype[0] Length[4]01:21:16: 00 00 00 0B01:21:16: Client[AAA] Type[2] Subtype[0] Length[2]01:21:16: 00 0001:21:16: Client[AAA] Type[3] Subtype[0] Length[4]01:21:16: 00 00 00 0B01:21:16: Client[AAA] Type[4] Subtype[0] Length[84]01:21:16: 00 00 00 00 00 00 00 00 63 E8 73 D0 00 00 00 0B01:21:16: 64 02 FE 71 00 00 00 00 00 00 00 00 00 00 00 0001:21:16: 00 00 00 04 00 00 00 01 00 00 00 20 00 00 00 0001:21:16: 58 00 00 09 02 0A 00 20 E4 68 43 2C 2F E7 B4 5701:21:16: 05 70 FF B1 22 13 E8 0F 1C 06 00 00 00 C8 06 0601:21:16: 00 00 00 02
Cisco IOS Debug Command Reference - Commands A through D 19
debug aaa accounting through debug auto-configdebug aaa redundancy
01:21:16: Client[LTERM] Type[1] Subtype[0] Length[4]01:21:16: 00 00 20 1301:21:16: CCM:PPPoE Recreate Session Active[0x58000009] Standby[0x98000009]01:21:16: CCM: PPPoE Required01:21:16: CCM: PPP Required01:21:16: CCM: LTERM Required01:21:16: CCM: PPPoE is Initiator01:21:16: AAA/CCM/: return checkpointed aaa id = 0000000B01:21:16: Adding cache entry for id B01:21:16: Author cache len 84 84 8401:21:16: AAA/CCM/(0000000B):return acct_sess_id = 1101:21:16: CCM: AAA Ready01:21:16: AAA/CCM/(0000000B): AAA sso init completed successfully01:21:16: SSS INFO: Element type is Access-Type = 3 (PPPoE)01:21:16: SSS INFO: Element type is Protocol-Type = 0 (PPP)01:21:16: SSS INFO: Element type is Media-Type = 1 (Ethernet)01:21:16: SSS INFO: Element type is Switch-Id = 4105 (00001009)01:21:16: SSS INFO: Element type is Segment-Hdl = 4114 (00001012)01:21:16: SSS INFO: Element type is AAA-Id = 11 (0000000B)01:21:16: SSS INFO: Element type is AccIe-Hdl = 4127195145 (F6000009)01:21:16: SSS INFO: Element type is SHDB-Handle = 2550136841 (98000009)01:21:16: SSS INFO: Element type is Input Interface = "GigabitEthernet6/0/0"01:21:16: SSS MGR [uid:10]: Sending a Session Assert ID Mgr event01:21:16: SSS MGR [uid:10]: Updating ID Mgr with the following keys:aaa-unique-id 11 (0xB)
01:21:16: SSS MGR [uid:10]: Handling Policy Service Authorize action (1 pending sessions)01:21:16: SSS PM [uid:10][63D6963C]: RM/VPDN disabled: RM/VPDN author not needed01:21:16: SSS MGR [uid:10]: Got reply Need More Keys from PM01:21:16: SSS MGR [uid:10]: Handling Need More Keys action01:21:16: SSS INFO: Element type is Unauth-User = "user1"01:21:16: SSS INFO: Element type is AccIe-Hdl = 4127195145 (F6000009)01:21:16: SSS INFO: Element type is AAA-Id = 11 (0000000B)01:21:16: SSS INFO: Element type is Access-Type = 0 (PPP)01:21:16: SSS INFO: Element type is Protocol-Type = 0 (PPP)01:21:16: SSS MGR [uid:10]: Sending a Session Update ID Mgr event01:21:16: SSS MGR [uid:10]: Updating ID Mgr with the following keys:username "user1"aaa-unique-id 11 (0xB)
01:21:16: SSS MGR [uid:10]: Handling Policy Send More Keys action01:21:16: SSS PM [uid:10][63D6963C]: SGBP disabled: SGF author not needed01:21:16: SSS MGR [uid:10]: Got reply Local Terminate from PM01:21:16: SSS MGR [uid:10]: Handling Connect Local Service action01:21:16: SSS MGR [uid:10]: Need the resource type determined key01:21:16: SSS MGR [uid:10]: Handling Need More Keys action01:21:16: SSS MGR [uid:10]: Not yet ready to start the Local service01:21:16: AAA/CCM/(0000000B):return authen_method_index = 001:21:16: RADIUS/ENCODE(0000000B):Orig. component type = PPoE01:21:16: RADIUS: AAA Unsupported Attr: client-mac-address[42] 1401:21:16: RADIUS: 30 30 30 61 2E 34 32 37 64 2E 65 63 [ 000a.427d.ec]01:21:16: RADIUS: AAA Unsupported Attr: interface [171] 701:21:16: RADIUS: 36 2F 30 2F 30 [ 6/0/0]01:21:16: RADIUS(0000000B): Config NAS IP: 0.0.0.001:21:16: RADIUS/ENCODE(0000000B): acct_session_id: 1101:21:16: RADIUS(0000000B): sending01:21:16: RADIUS/ENCODE: Best Local IP-Address 2.1.1.1 for Radius-Server 9.2.36.25301:21:16: RADIUS(0000000B): Send Access-Request to 9.2.36.253:1645 id 1645/10, len 8601:21:16: RADIUS: authenticator 14 48 25 90 A5 7B 53 02 - 11 05 01 13 6D 34 E2 0401:21:16: RADIUS: Framed-Protocol [7] 6 PPP [1]01:21:16: RADIUS: User-Name [1] 9 "user1"01:21:16: RADIUS: User-Password [2] 18 *01:21:16: RADIUS: NAS-Port-Type [61] 6 Virtual [5]01:21:16: RADIUS: NAS-Port [5] 6 001:21:16: RADIUS: NAS-Port-Id [87] 9 "6/0/0/0"01:21:16: RADIUS: Service-Type [6] 6 Framed [2]01:21:16: RADIUS: NAS-IP-Address [4] 6 2.1.1.101:21:16: RADIUS: Cached response01:21:16: RADIUS: authenticator E4 68 43 2C 2F E7 B4 57 - 05 70 FF B1 22 13 E8 0F01:21:16: RADIUS: Idle-Timeout [28] 6 20001:21:16: RADIUS: Service-Type [6] 6 Framed [2]01:21:16: RADIUS(0000000B): Received from id 1645/1001:21:16: SSS INFO: Element type is Auth-User = "user1"01:21:16: SSS INFO: Element type is AAA-Attr-List = 2000010001:21:16: SSS INFO: Element type is idletime 200 (0xC8)
Cisco IOS Debug Command Reference - Commands A through D20
debug aaa accounting through debug auto-configdebug aaa redundancy
01:21:16: SSS INFO: Element type is service-type 2 [Framed]01:21:16: SSS INFO: Element type is Resource-Determined = 1 (YES)01:21:16: SSS INFO: Element type is Access-Type = 0 (PPP)01:21:16: SSS INFO: Element type is Protocol-Type = 0 (PPP)01:21:16: SSS INFO: Element type is Final = 1 (YES)01:21:16: SSS MGR [uid:10]: Handling Connect Local Service action01:21:16: SSS MGR [uid:10]: Rcvd an AAA attr list from SIP, pushing it to the PM01:21:16: SSS MGR [uid:10]: Handling Send Policy Push Cng action01:21:16: SSS MGR [uid:10]: Not yet ready to start the Local service01:21:16: SSS MGR [uid:10]: Got reply Apply Config from PM01:21:16: SSS MGR [uid:10]: Successfully applied policy config01:21:16: SSS MGR [uid:10]: Handling Connect Local Service action01:21:16: CCM: LTERM Required01:21:16: SSS LTERM [uid:10]: Processing Local termination request01:21:16: SSS LTERM [uid:10]: Sent create-clone request to vtemplate manager01:21:16: SSS LTERM [uid:10]: Created vaccess interface Vi301:21:16: CCM: LTERM Ready01:21:16: SSS LTERM [uid:10]: Segment provision successful01:21:16: SSS MGR [uid:10]: Handling Local Service Connected action01:21:16: SSS MGR [uid:10]: Apply for Vi3: segment 4114, owner 256691407701:21:16: SSS MGR [uid:10]: Interface config 218170B801:21:16: SSS MGR [uid:10]: Per-user config 63E0655001:21:16: SSS LTERM [uid:10]: Switching session provisioned01:21:16: SSS MGR [uid:10]: Handling Local Service Connected, Features Applied action01:21:16: SSS LTERM [uid:10]: Installed Vi3 process path switching vector01:21:16: SSS LTERM [uid:10]: Installed Vi3 fastsend path switching vector01:21:16: CCM: PPPoE Ready01:21:16: CCM: PPP Ready01:21:16: CCM: PPP Old State[Not Ready] Event[All Ready]01:21:16: CCM: New State[Ready]The table below describes the significant fields shown in the display.
Table 3: debug aaa redundancy Field Descriptions
DescriptionField
AAA unique ID for the session.(0000000B)
Adding synchronization attribute-value pair.Adding sync avp
The AAA synchronization data type.[AAA Unique ID]
Related Commands DescriptionCommand
Displays debugging information about CiscoCallManager.
debug ccm-manager
Cisco IOS Debug Command Reference - Commands A through D 21
debug aaa accounting through debug auto-configdebug aaa redundancy
debug aaa sg-server selectionTo obtain information about why the RADIUS and TACACS+ server group system in a router is choosing aparticular server, use the debugaaasg-serverselectioncommand in privileged EXEC mode. To disabledebugging output, use the no form of this command.
debug aaa sg-server selection
no debug aaa sg-server selection
Syntax Description This command has no arguments or keywords.
Command Default Debugging is not turned on.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.3(1)
This command was extended for RADIUS server load balancing to showwhich server is selected on the basis of a load balancing algorithm.
12.2(28)SB
This command was integrated into Cisco IOS Release 12.4(11)T.12.4(11)T
This command was integrated into Cisco IOS Release 12.2(33)SRC.12.2(33)SRC
Examples The following example shows that debugging has been set to display information about server selection:
Router# debug aaa sg-server selectionThe following two debug outputs display the behavior of RADIUS transactions within a server group withthe server-reorder-on-failure feature configured.
Examples In the following sample output, the RADIUS server-reorder-on-failure feature is configured. The serverretransmits are set to 0 (so each server is attempted only once before failover to the next configured server),and the transmissions per transaction are set to 4 (the transmissions will stop on the third failover). The thirdserver in the server group (192.0.2.118) has accepted the transaction on the third transmission (second failover).
00:38:35: %SYS-5-CONFIG-I: Configured from console by console00:38:53: RADIUS/ENCODE(OOOOOOOF) : ask "Username: "00:38:53: RADIUS/ENCODE (0000000F) : send packet; GET-USER00:38:58: RADIUS/ENCODE (0000000F) : ask "Password: "00:38:58: RADIUS/ENCODE(0000000F) : send packet; GET-PASSWORD00:38:59: RADIUS: AAA Unsupported [152] 400:38:59: RADIUS: 7474 [tt]00:38:59: RADIUS (0000000F) : Storing nasport 2 in rad-db
Cisco IOS Debug Command Reference - Commands A through D22
debug aaa accounting through debug auto-configdebug aaa sg-server selection
00:38:59: RADIUS/ENCODE(0000000F) : dropping service type, "radius-serverattribute 6 on-for-login-auth" is off00:38:59: RADIUS (0000000F) : Config NAS IP: 192.0.2.400:38:59: RADIUS/ENCODE (0000000F) : acct-session-id: 1500:38:59: RADIUS (0000000F) : sending00:38:59: RADIUS/ENCODE: Best Local IP-Address 192.0.2.130 for Radius-Server 192.0.2.100:38:59: RAPIUS(0000000F) : Send Access-Request to 192.0.2.1:1645 id 21645/11, len 7800:38:59: RADIUS:: authenticator 4481 E6 65 2D 5F 6F OA -lE F5 81 8F 4E 1478 9C00:38:59: RADIUS: User-Name [1] 7 "username"00:38:59: RADIUS: User-Password [2] 18 *00:38:59: RADIUS: NAS-Port fSl 6 200:~8:59: RADIUS: NAS-Port-Type [61] 6 Virtual [5]00:38:59: RADIUS: Calling-Station-Id [31] 15 "192.0.2.23"00:39:00: RADIUS: NAS-IP-Address [4] 6 192.0.2.13000:39:02: RADIUS: Fail-over to (192.0.2.2:1645,1646) for id 21645/1100:39:02: RADIUS/ENCODE: Best Local IP-Address 192.0.2.130 for Radius-Server 192.0.2.200:39:04: RADIUS: Fail-over to (192.0.2.118:1645,1646) for id 21645/1100:39:04: RADIUS/ENCODE: Best Local IP-Address 192.0.2.130 for Radius-Server192.0.2.11800:39:05: RADIUS: Received from id 21645/11 192.0.2.118:1645, Access-Accept, len 2600:39:05: RADIUS: authenticator 5609 56 F9 64 4E DF 19- F3 A2 DD 73 EE 3F 982600:39:05: RADIUS: Service-Type [6] 6 Login [1]
Examples In the following sample output, the RADIUS server-reorder-on-failure feature is configured. The serverretransmits are set to 0, and the transmissions per transaction are set to 8. In this transaction, the transmissionto server 192.0.2.1 has failed on the eighth transmission.
00:42:30: RADIUS(00000011): Received from id 21645/1300:43:34: RADIUS/ENCODE(00000012) : ask "Username: "00:43:34: RADIUS/ENCODE(00000012) : send packet; GET-USER00:43:39: RADIUS/ENCODE(00000012) : ask "Password: "00:43:39: RADIUS/ENCODE(00000012) : send packet; GET-PASSWORD00:43:40: RADIUS: AAA Unsupported [152] 400:43:40: RADIUS: 7474 [tt]00:43:40: RADIUS(00000012) : Storing nasport 2 in rad-db00:43:40: RADIUS/ENCODE(00000012): dropping service type, "radius-server attribute 6on-for-login-auth" is off00:43:40: RADIUS(00000012) : Co~fig NAS IP: 192.0.2.400:43:40: RADIUS/ENCODE(00000012) : acct-session-id: 1800:43:40: RADIUS(00000012) : sending00:43:40: RADIUS/ENCODE: Best Local IP-Address 192.0.2.130 for Radius-Server 192.0.2.11800:43:40: RADIUS(00000012) : Send Access-Request to 192.0.2.118:1645 id 21645/14, len 7800:43:40: RADIUS: authenticator B8 OA 51 3A AF A6 0018 -B3 2E 94 5E 07 OB 2A00:43:40: RADIUS: User-Name [1] 7 "username"00:43:40: RADIUS: User-Password [2] 18 *00:43:40: RADIUS: NAS-Port [5] 6 200:43:40: RADIUS: NAS-Port-Type [61] 6 Virtual [5]00:43:40: RADIUS: Calling-Station-]d [31] 15 "192.0.2.23"00:43:40: RADIUS: NAS-IP-Address [4] 6 192.0.2.13000:43:42: RADIUS: Fail-over to (192.0.2,1:1645,1646) for id 21645/1400:43:42: RADIUS/ENCODE: Best Local IP-Address 192.0.2.130 for Radius-Server 192.0.2.100:43:44: RADIUS: Fail-over to (192.0.2.2:1645,1646) for id 21645/1400:43:44: RADIUS/ENCODE: Best Local IP-Address 192.0.2.130 for Radius-Server 192.0.2.200:43:46: RADIUS: Fail-over to (192.0.2.118:1645,1646) for id 21645/1400:43:46: RADIUS/ENCODE: Best Local IP-Address 192.0.2.130 for Radius-Server 192.0.2.11800:43:48: RADIUS: Fail-over to (192.0.2.1:1645,1646) for id 21645/1400:43:48: RADIUS/ENCODE: Best Local IP-Address 192.0.2.130 for Radius-Server 192.0.2.100:43:50: RADIUS: Fail-over to (192.0.2.2:1645,1646) for id 21645/1400:43:50: RADIUS/ENCODE: Best Local IP-Address 192.0.2.130 for Radius-Server 192.0.2.200:43:52: RADIUS: Fail-over to (192.0.2.118:1645,1646) for id 21645/1400:43:52: RADIUS/ENCODE: Best Local IP-Address 192.0.2.130 for Radius-Server 192.0.2.11800:43:54: RADIUS: Fail-over to (192.0.2.1:1645,1646) for id 21645/1400:43:54: RADIUS/ENCODE: Best Local IP-Address 192.0.2.130 for Radius-Server 192.0.2.100:43:56: RADIUS: No response from (192.0.2.1:1645,1646) for id 21645/1400:43:56:RADIUS/DECODE: parse response no app start; FAIL00:43:56: RADIUS/DECODE: parse response;FAIL
The field descriptions are self-explanatory.
Cisco IOS Debug Command Reference - Commands A through D 23
debug aaa accounting through debug auto-configdebug aaa sg-server selection
Examples In the following sample output, the RADIUS server load balancing feature is enabled with a batch size of 3.The server selection, based on the load balancing algorithm, is shown as five access-requests that are beingsent to the server group.
Router# debug aaa sg-server selectionJul 16 03:15:05: AAA/SG/SERVER_SELECT: Obtaining least loaded server.Jul 16 03:15:05: AAA/SG/SERVER_SELECT: [3] transactions remaining in batch. Reusing server.Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Obtaining least loaded server.Jul 16 03:15:05: AAA/SG/SERVER_SELECT: [2] transactions remaining in batch. Reusing server.Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Obtaining least loaded server.Jul 16 03:15:05: AAA/SG/SERVER_SELECT: [1] transactions remaining in batch. Reusing server.Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Obtaining least loaded server.Jul 16 03:15:05: AAA/SG/SERVER_SELECT: No more transactions in batch. Obtaining a new server.Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Obtaining a new least loaded server.Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Server[0] load: 3Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Server[1] load: 0Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Server[2] load: 0Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Selected Server[1] with load 0Jul 16 03:15:05: AAA/SG/SERVER_SELECT: [3] transactions remaining in batch.Jul 16 03:15:05: AAA/SG/SERVER_SELECT: Obtaining least loaded server.Jul 16 03:15:05: AAA/SG/SERVER_SELECT: [2] transactions remaining in batch. Reusing server.
The field descriptions are self-explanatory.
Related Commands DescriptionCommand
Enables RADIUS server load balancing for namedRADIUS server groups.
load-balance
Enables RADIUS server load balancing for the globalRADIUS server group.
radius-server load-balance
Specifies the reordering of RADIUS traffic retriesamong a server group.
radius-server retry method reorder
Specifies the maximum number of transmissions pertransaction that may be retried on a RADIUS server.
radius-server transaction max-tries
Tests RADIUS load balancing server responsemanually.
test aaa group
Cisco IOS Debug Command Reference - Commands A through D24
debug aaa accounting through debug auto-configdebug aaa sg-server selection
debug aaa testTo show when the idle timer or dead timer has expired, when test packets are being sent, server responsestatus, and the server state for RADIUS server load balancing, use the debugaaatestcommand in privilegedEXEC mode. To disable debugging output, use the no form of this command.
debug aaa test
no debug aaa test
Syntax Description This command has no arguments or keywords.
Command Default Debugging is not enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(28)SB
This command was integrated into Cisco IOS Release 12.4(11)T.12.4(11)T
This command was integrated into Cisco IOS Release 12.2(33)SRC.12.2(33)SRC
Examples In the following sample output, the RADIUS server load balancing feature is enabled. The idle timer hasexpired.
Router# debug aaa testRouter#Jul 16 00:07:01: AAA/SG/TEST: Server (192.0.2.245:1700,1701) quarantined.Jul 16 00:07:01: AAA/SG/TEST: Sending test request(s) to server (192.0.2.245:1700,1701)Jul 16 00:07:01: AAA/SG/TEST: Sending 1 Access-Requests, 1 Accounting-Requests in currentbatch.Jul 16 00:07:01: AAA/SG/TEST(Req#: 1): Sending test AAA Access-Request.Jul 16 00:07:01: AAA/SG/TEST(Req#: 1): Sending test AAA Accounting-Request.Jul 16 00:07:01: AAA/SG/TEST: Obtained Test response from server (192.0.2.245:1700,1701)Jul 16 00:07:01: AAA/SG/TEST: Obtained Test response from server (192.0.2.245:1700,1701)Jul 16 00:07:01: AAA/SG/TEST: Necessary responses received from server (192.0.2.245:1700,1701)Jul 16 00:07:01: AAA/SG/TEST: Server (192.0.2.245:1700,1701) marked ALIVE. Idle timer setfor 60 sec(s).Jul 16 00:07:01: AAA/SG/TEST: Server (192.0.2.245:1700,1701) removed from quarantine.
Related Commands DescriptionCommand
Enables RADIUS server load balancing for namedRADIUS server groups.
load-balance
Cisco IOS Debug Command Reference - Commands A through D 25
debug aaa accounting through debug auto-configdebug aaa test
DescriptionCommand
Enables RADIUS automated testing for loadbalancing.
radius-server host
Enables RADIUS server load balancing for the globalRADIUS server group.
radius-server load-balance
Tests RADIUS load balancing server responsemanually.
test aaa group
Cisco IOS Debug Command Reference - Commands A through D26
debug aaa accounting through debug auto-configdebug aaa test
debug acircuitTo display errors and events that occur on the attachment circuits (the circuits between the provider edge (PE)and customer edge (CE) routers), use thedebugacircuit command in privileged EXEC mode. To disabledebugging output, use the no form of this command.
debug acircuit {error| event}
no debug acircuit {error| event}
Syntax Description Displays errors that occur in attachment circuits.error
Displays events that occur in attachment circuits.event
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.0(23)S
This command was integrated into Cisco IOS Release 12.2(14)S.12.2(14)S
This command was integrated into Cisco IOS Release 12.2(15)T.12.2(15)T
This command was integrated into Cisco IOS Release 12.2(25)S.12.2(25)S
Support for this command was integrated into Cisco IOS Release12.2(27)SBC.
12.2(27)SBC
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines Use the debugacircuit command to identify provisioning events, setup failures, circuit up and down events,and configuration failures on attachment circuits.
An attachment circuit connects a PE router to a CE router. A router can have many attachment circuits. Theattachment circuit manager controls all the attachment circuits from one central location. Therefore, whenyou enable the debug messages for the attachment circuit, you receive information about all the attachmentcircuits.
Examples The following is sample output from the debugacircuitevent command when you enable an interface:
Router# debug acircuit event*Jan 28 15:19:03.070: ACLIB: ac_cstate() Handling circuit UP for interface Se2/0
Cisco IOS Debug Command Reference - Commands A through D 27
debug aaa accounting through debug auto-configdebug acircuit
*Jan 28 15:19:03.070: ACLIB [11.0.1.1, 200]: pthru_intf_handle_circuit_up() callingacmgr_circuit_up*Jan 28 15:19:03.070: ACLIB [11.0.1.1, 200]: Setting new AC state to Ac-Connecting*Jan 28 15:19:03.070: ACMGR: Receive <Circuit Up> msg*Jan 28 15:19:03.070: Se2/0 ACMGR: circuit up event, SIP state chg down to connecting,action is service request*Jan 28 15:19:03.070: Se2/0 ACMGR: Sent a sip service request*Jan 28 15:19:03.070: ACLIB [11.0.1.1, 200]: AC updating switch context.*Jan 28 15:19:03.070: Se2/0 ACMGR: Rcv SIP msg: resp connect forwarded, hdl 9500001D,l2ss_hdl 700001E*Jan 28 15:19:03.070: Se2/0 ACMGR: service connected event, SIP state chg connecting toconnected, action is respond forwarded*Jan 28 15:19:03.070: ACLIB: pthru_intf_response hdl is 9500001D, response is 1*Jan 28 15:19:03.070: ACLIB [11.0.1.1, 200]: Setting new AC state to Ac-ConnectedThe following is sample output from the debugacircuitevent command when you disable an interface:
Router# debug acircuit event*Jan 28 15:25:57.014: ACLIB: SW AC interface INTF-DOWN for interface Se2/0*Jan 28 15:25:57.014: ACLIB [11.0.1.1, 200]: Setting new AC state to Ac-Idle*Jan 28 15:25:57.014: ACLIB: SW AC interface INTF-DOWN for interface Se2/0*Jan 28 15:25:57.014: Se2/0 ACMGR: Receive <Circuit Down> msg*Jan 28 15:25:57.014: Se2/0 ACMGR: circuit down event, SIP state chg connected to end,action is service disconnect*Jan 28 15:25:57.014: Se2/0 ACMGR: Sent a sip service disconnect*Jan 28 15:25:57.014: ACLIB [11.0.1.1, 200]: AC deleting switch context.*Jan 28 15:25:59.014: %LINK-5-CHANGED: Interface Serial2/0, changed state toadministratively down*Jan 28 15:25:59.014: ACLIB: ac_cstate() Handling circuit DOWN for interface Se2/0*Jan 28 15:26:00.014:%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial2/0, changedstate to downThe following example shows output from the debugacircuitcommand for an xconnect session on an Ethernetinterface:
Router# debug acircuit23:28:35: ACLIB [10.0.3.201, 5]: SW AC interface UP for Ethernet interface Et2/123:28:35: ACLIB [10.0.3.201, 5]: pthru_intf_handle_circuit_up() calling acmgr_circuit_up23:28:35: ACLIB [10.0.3.201, 5]: Setting new AC state to Ac-Connecting23:28:35: ACLIB [10.0.3.201, 5]: SW AC interface UP for Ethernet interface Et2/123:28:35: ACLIB [10.0.3.201, 5]: pthru_intf_handle_circuit_up() ignoring up event. Alreadyconnected or connecting.23:28:35: ACMGR: Receive <Circuit Up> msg23:28:35: Et2/1 ACMGR: circuit up event, SIP state chg down to connecting, action is servicerequest23:28:35: Et2/1 ACMGR: Sent a sip service request23:28:37: %LINK-3-UPDOWN: Interface Ethernet2/1, changed state to up23:28:38: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet2/1, changed state to up
23:28:53: Et2/1 ACMGR: Rcv SIP msg: resp connect forwarded, hdl D6000002, sss_hdl 9E00000F
23:28:53: Et2/1 ACMGR: service connected event, SIP state chg connecting to connected,action is respond forwarded23:28:53: ACLIB: pthru_intf_response hdl is D6000002, response is 123:28:53: ACLIB [10.0.3.201, 5]: Setting new AC state to Ac-ConnectedThe command output is self-explanatory.
Related Commands DescriptionCommand
Displays errors and events relating to L2TPconfiguration and the surrounding Layer 2 tunnelinginfrastructure.
debug vpdn
Displays errors and events related to an xconnectconfiguration.
debug xconnect
Cisco IOS Debug Command Reference - Commands A through D28
debug aaa accounting through debug auto-configdebug acircuit
Cisco IOS Debug Command Reference - Commands A through D 29
debug aaa accounting through debug auto-configdebug acircuit
debug acircuit checkpointTo enable the display of attachment circuit checkpoints, use the debug acircuit checkpoint command inprivileged EXEC mode. To disable the display of these messages, use the no form of this command.
debug acircuit checkpoint
no debug acircuit checkpoint
Syntax Description This command has no arguments or keywords.
Command Default Debugging of attachment circuit checkpoints is disabled.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(25)S
This command was integrated into Cisco IOS Release 12.2(28)SB.12.2(28)SB
This command was integrated into Cisco IOS Release 12.2(33)SRC.12.2(33)SRC
Usage Guidelines Use this command when Any Transport over MPLS (AToM) is configured for nonstop forwarding/statefulswitchover (NSF/SSO) and Graceful Restart.
Use debug commands with caution. They use a significant amount of CPU resources and can affect systemperformance.
Examples The debugacircuitcheckpoint command is issued on the active route processor (RP):
Router# debug mpls l2transport checkpointRouter# debug acircuit checkpointRouter# show debugAToM HA:AToM checkpointing events and errors debugging is on
AC HA:Attachment Circuit Checkpoint debugging is on
Router# conf terminalEnter configuration commands, one per line. End with CNTL/Z.Router(config)# interface Fa5/1/1.2Router(config-subif)# xconnect 10.55.55.2 1002 pw-class mplsAToM HA [10.55.55.2, 1002]: Build provision msg, SSM sw/seg 8192/8194 [0x2000/0x2002] PWid 9216 [0x2400] local label 21AC HA: Dynamic Sync. Event:4 Sw:8192[2000] Se:16385[4001]AToM HA: CF sync send completeAC HA CF: Sync send complete. Code:0
Cisco IOS Debug Command Reference - Commands A through D30
debug aaa accounting through debug auto-configdebug acircuit checkpoint
On the standby RP, the following messages indicate that it receives checkpointing data:
AC HA [10.55.55.2, 1002]: Add to WaitQ. Flags:1AToM HA [10.55.55.2, 1002]: Received 32-byte provision version 1 CF messageAC HA CF: ClientId:89, Entity:0 Length:40AToM HA [10.55.55.2, 1002]: Process chkpt msg provision [1], ver 1AToM HA [10.55.55.2, 1002]: Reserved SSM sw/seg 8192/8194 [0x2000/0x2002] PW id 9216 [0x2400]AC HA: Process Msg:35586. Ptr:44CBFD90. Val:0AC HA: Sync. Event:4 CktType:4 Sw:8192[2000] Se:16385[4001]AC HA [10.55.55.2, 1002]: Remove from WaitQ. Flags:1[OK][OK]During a switchover from an active RP to a backup RP, the debug messages look similar to the following:
%HA-5-MODE: Operating mode is hsa, configured mode is sso.AC HA RF: CId:83, Seq:710, Sta:RF_STATUS_OPER_REDUNDANCY_MODE_CHANGE, Opr:5, St:STANDBYHOT, PSt:ACTIVEAToM HA: CID 84, Seq 715, Status RF_STATUS_OPER_REDUNDANCY_MODE_CHANGE, Op 5, State STANDBYHOT, Peer ACTIVEAC HA RF: CId:83, Seq:710, Sta:RF_STATUS_PEER_PRESENCE, Opr:0, St:STANDBY HOT, PSt:ACTIVEAToM HA: CID 84, Seq 715, Status RF_STATUS_PEER_PRESENCE, Op 0, State STANDBY HOT, PeerACTIVEAC HA RF: CId:83, Seq:710, Sta:RF_STATUS_PEER_COMM, Opr:0, St:STANDBY HOT, PSt:DISABLEDAToM HA: CID 84, Seq 715, Status RF_STATUS_PEER_COMM, Op 0, State STANDBY HOT, Peer DISABLED%HA-2-CUTOVER_NOTICE: Cutover initiated. Cease all console activity until system restarts.%HA-2-CUTOVER_NOTICE: Do not add/remove RSPs or line cards until switchover completes.%HA-2-CUTOVER_NOTICE: Deinitializing subsystems...%OIR-6-REMCARD: Card removed from slot 4, interfaces disabled%OIR-6-REMCARD: Card removed from slot 5, interfaces disabled%OIR-6-REMCARD: Card removed from slot 9, interfaces disabled%HA-2-CUTOVER_NOTICE: Reinitializing subsystems...%HA-2-CUTOVER_NOTICE: System preparing to restart...%HA-5-NOTICE: Resuming initialization...AC HA RF: CId:83, Seq:710, Sta:RF_STATUS_REDUNDANCY_MODE_CHANGE, Opr:7, St:STANDBY HOT,PSt:DISABLED...%LDP-5-GR: LDP restarting gracefully. Preserving forwarding state for 250 seconds.AC HA RF: CId:83, Seq:710, Sta:RF_PROG_ACTIVE, Opr:0, St:ACTIVE, PSt:DISABLEDAToM HA: CID 84, Seq 715, Event RF_PROG_ACTIVE, Op 0, State ACTIVE, Peer DISABLEDAC HA: Process Msg:35588. Ptr:0. Val:0AC HA: Switchover: Standby->ActiveAC HA RF: Reconciling
Related Commands DescriptionCommand
Enables the display of AToM events when AToM isconfigured for NSF/SSO and Graceful Restart.
debug mpls l2transport checkpoint
Cisco IOS Debug Command Reference - Commands A through D 31
debug aaa accounting through debug auto-configdebug acircuit checkpoint
debug adjacencyTo enable the display of information about the adjacency database, use the debug adjacencycommand inprivileged EXEC mode. To disable the display of these events, use the no form of this command.
debug adjacency [epoch| ipc| state| table] [ prefix ] [ interface ] [connectionid id] [link {ipv4| ipv6| mpls}]
no debug adjacency [epoch| ipc| state| table] [ prefix ] [ interface ] [connectionid id] [link {ipv4| ipv6|mpls}]
Syntax Description (Optional) Displays adjacency epoch events.epoch
(Optional) Displays interprocess communication(IPC) events for adjacencies.
ipc
(Optional) Displays adjacency system state machineevents.
state
(Optional) Displays adjacency table operations.table
(Optional) Displays debugging events for thespecified IP address or IPv6 address.
On the Cisco 10000 series routers, IPv6 issupported in Cisco IOS Release 12.2(28)SBand later releases.
Note
prefix
(Optional) Displays debugging events for thespecified interface. For line cards, you must specifythe line card if_number (interface number). Use theshow cef interface command to obtain line cardif_numbers.
interface
(Optional) Displays debugging events for thespecified client connection identification number.
connectionid id
(Optional) Displays debugging events for thespecified link type (IP, IPv6, or Multiprotocol LabelSwitching [MPLS] traffic).
On the Cisco 10000 series routers, IPv6 issupported in Cisco IOS Release 12.2(28)SBand later releases.
Note
link {ipv4 | ipv6 |mpls
Command Default Debugging events are not displayed.
Command Modes Privileged EXEC
Cisco IOS Debug Command Reference - Commands A through D32
debug aaa accounting through debug auto-configdebug adjacency
Command History ModificationRelease
This command was introduced on the Cisco 7600 series routers.12.0(7)XE
This command was implemented on the Cisco 7600 series routers.12.1(1)E
This command was implemented on the Supervisor Engine 720.12.2(14)SX
This command was integrated into Cisco IOS Release 12.2(25)S, and theprefix , interface , connectionidid , and link {ipv4 | ipv6 |mpls} keywordsand arguments were added.
12.2(25)S
This command was integrated into Cisco IOS Release 12.2(28)SB andimplemented on the Cisco 10000 series routers.
12.2(28)SB
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines Because debugging output is assigned high priority in the CPU process, you should use debug commandsonly to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff.Also, you should use debug commands during periods of lower network traffic and fewer users. Debuggingduring these periods decreases the likelihood that increased debug command processing overhead will affectsystem use.
You can use any combination of the prefix , interface , connectionidid , and link {ipv4 | ipv6 |mpls} keywordsand arguments (in any order) as a filter to enable debugging for a specified subset of adjacencies.
On the Cisco 10000 series routers, IPv6 is supported in Cisco IOS Release 12.2(28)SB and later releases.Note
Examples The following example shows how to display information on the adjacency database:
Router# debug adjacency*Jan 27 06:22:50.543: ADJ-ios_mgr: repopulate adjs on up event for Ethernet3/0*Jan 27 06:22:50.543: ADJ: IPV6 adj out of Ethernet3/0, addr FE80::20C:CFFF:FEDF:6854(incomplete) no src set: init/update from interface*Jan 27 06:22:50.543: ADJ: IPV6 adj out of Ethernet3/0, addr FE80::20C:CFFF:FEDF:6854(incomplete) no src set: set bundle to IPv6 adjacency oce*Jan 27 06:22:50.543: ADJ: IPV6 adj out of Ethernet3/0, addr FE80::20C:CFFF:FEDF:6854(incomplete) no src set: allocated, setup and inserted OK*Jan 27 06:22:50.543: ADJ: IPV6 adj out of Ethernet3/0, addr FE80::20C:CFFF:FEDF:6854(incomplete) src IPv6 ND: source IPv6 ND added OK*Jan 27 06:22:50.543: ADJ: IPV6 adj out of Ethernet3/0, addr FE80::20C:CFFF:FEDF:6854(incomplete) src IPv6 ND: computed macstring (len 14): OK*Jan 27 06:22:50.543: ADJ: IPV6 adj out of Ethernet3/0, addr FE80::20C:CFFF:FEDF:6854 srcIPv6 ND: made complete (macstring len 0 to 14/0 octets)00:04:40: %LINK-3-UPDOWN: Interface Ethernet3/0, changed state to up00:04:41: %LINEPROTO-5-UPDOWN: Line protocol on Interface Ethernet3/0, changed
Cisco IOS Debug Command Reference - Commands A through D 33
debug aaa accounting through debug auto-configdebug adjacency
Related Commands DescriptionCommand
Clears the Cisco Express Forwarding adjacency table.clear adjacency
Deletes all dynamic entries from the ARP cache.clear arp-cache
Displays Cisco Express Forwarding adjacency tableinformation.
show adjacency
Displays information about the hardware Layer 3switching adjacency node.
show mls cef adjacency
Cisco IOS Debug Command Reference - Commands A through D34
debug aaa accounting through debug auto-configdebug adjacency
debug adjacency (vasi)To display debugging information for the VRF-Aware Service Infrastructure (VASI) adjacency, use thedebugadjacency command in privileged EXEC mode. To disable debugging output, use the no form of thiscommand.
debug adjacency {vasileft| vasiright} number
no debug interface {vasileft| vasiright} number
Syntax Description Displays information about the vasileft interface.vasileft
Displays information about the vasiright interface.vasiright
Identifier of the VASI interface. The range is from 1to 256.
number
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.Cisco IOS XE Release 2.6
Examples The following is sample output from the debugadjacencycommand:
Router# debug adjacency veasileft 1Condition 1 set
Related Commands Displays debugging information for the VASI.debug vasi
Displays debugging information for the VASIinterface descriptor block.
debug interface (vasi)
Configures VASI virtual interface.interface (vasi)
Displays the status of a VASI pair.show vasi pair
Cisco IOS Debug Command Reference - Commands A through D 35
debug aaa accounting through debug auto-configdebug adjacency (vasi)
debug alarm-interfaceTo show real-time activities in the data channel or the management channel of the Alarm Interface Controller(AIC), use the debugalarm-interface command in privileged EXECmode. To disable debugging output, usetheno form of this command.
debug alarm-interface slot-number {data| management}
no debug alarm-interface slot-number {data| management}
Syntax Description Router chassis slot where the AIC network moduleis installed.
slot-number
Displays AIC serial data channel and asynchronouscraft port communication activity.
data
Displays IOS-to-AIC communication activity.management
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced for the Cisco 2600 series and the Cisco3600 series.
12.2(2)XG
This command was integrated into Cisco IOS Release 12.2(8)T.12.2(8)T
Usage Guidelines This command allows you to observe the management channel activity from the AIC in the specified slot.Such activity shows that the software running on the AIC CPU has reached a minimum level of working order.
Examples The following is sample output from the debugalarm-interface command:
Router# debug alarm-interfaceAIC Slot 1:STATUS receivedThe following is sample output from the debugalarm-interface1data command:
Router# debug alarm-interface 1 dataAIC Slot 1:STATUS receivedaic_fastsend:particle count=1, len=1504aic_pak_to_txring:scattered particle count=1, tx bytes=1504, leftover=0aic_interrupt:# 30419 gstar=0x1000000
Cisco IOS Debug Command Reference - Commands A through D36
debug aaa accounting through debug auto-configdebug alarm-interface
aic_safe_start:particle count=1, len=524aic_pak_to_txring:scattered particle count=1, tx bytes=524, leftover=0aic_process_TXivq:ivq - 0x42040000 at 15, slice 1aic_interrupt:# 30420 gstar=0x1000000aic_process_TXivq:ivq - 0x42040000 at 16, slice 1aic_interrupt:# 30421 gstar=0x10000000aic_scc_rx_intr:sts_dlen=0xC5E10000, len=1504, RSTA=0xA0aic_serial_RX_interrupt:rxtype=1, len=1504, aic_scc_rx_intr:last_rxbd has aged, 2aic_process_RXivq:ivq - 0x60000 at 13, slice 1aic_interrupt:# 30422 gstar=0x10000000aic_scc_rx_intr:sts_dlen=0xC20D0000, len=524, RSTA=0xA0aic_serial_RX_interrupt:rxtype=1, len=524, aic_process_RXivq:ivq - 0x60000 at 14,slice 1aic_interrupt:# 30423 gstar=0x20000000aic_scc_rx_intr:sts_dlen=0xC00D0000, len=12, RSTA=0xA0aic_mgmt_RX_interrupt:len=12aic_mgmt_fastsend:particle count=1, len=20 / 20aic_pak_to_txring:scattered particle count=1, tx bytes=20, leftover=0aic_scc_rx_intr:last_rxbd has aged, 2aic_process_RXivq:ivq - 0x10060000 at 37, slice 1aic_interrupt:# 30424 gstar=0x2000000aic_process_TXivq:ivq - 0x52040000 at 24, slice 1
Related Commands DescriptionCommand
Enters the alarm interface mode and configures theAIC.
alarm-interface
Resets the AIC CPU.reset
Cisco IOS Debug Command Reference - Commands A through D 37
debug aaa accounting through debug auto-configdebug alarm-interface
debug alps ascuTo enable debugging for airline product set (ALPS) agent set control units (ASCUs) use the debugalpsascucommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug alps ascu {event| packet| detail| all| format {ipars| router| both}} [interface [ascu id]]
no debug alps ascu {event| packet| detail| all| format {ipars| router| both}} [interface [ascu id]]
Syntax Description Displays ASCU events or protocol errors.event
Displays sent or received packets.packet
Displays all ASCU protocol events.detail
Enables event, packet, and detail debugging.all
Specifies how to display ASCU addresses and thehexadecimal data in the debug output:
• ipars-- Displays only the IPARS hexadecimaloutput.
• router-- Displays only the router hexadecimaloutput.
• both-- Displays both the IPARS and routerhexadecimal output.
The only difference between the IPARS output andthe router output is the format of the hexadecimaldata.
format ipars router both
(Optional) Enables debugging on a specified interface.Applies only to the event, packet, detail, and allkeywords.
interface
(Optional) Enables debugging for a specified ASCU.ascu id
Command Default Debugging is off.
Command Modes Privileged EXEC
Cisco IOS Debug Command Reference - Commands A through D38
debug aaa accounting through debug auto-configdebug alps ascu
Command History ModificationRelease
This command was introduced for limited availability.11.3(6)T
This command was available for general release.12.0(1)
This command was modified.12.0(5)T
The format, ipars, router, and both keywords were added. The output forthis command was modified to include IPARS and router formats.
12.1(2)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines To enable debugging for a group of ASCUs, enter a separate command for each ASCU interface and IAcombination.
The interface option applies only to the event, packet, detail, and all keywords.
To specify the particular debug tracing level (event, packet, detail or all) and the format (router, pairsor both), you must configure the debugalpsascucommand two times: once to configure the debug tracinglevel and once to configure the format.
Note
Examples The following output is from the debugalpsascuevent command, showing events or protocol errors in routerformat for ASCU 42 on interface Serial7:
Router# debug alps ascu format router
Router# debug alps ascu event Serial7 42
ALPS ASCU: T1 expired for ascu 42 on i/f Serial7ALPS ASCU: DOWN event while UP for ascu 42 on i/f Serial7 : C1 count = 1
If you specify the ipars or both format for the event or detail tracing level, both the IPARS and routerformats will be displayed.
Note
The following output is from the debugalpsascuevent command, showing events or protocol errors in iparsformat for ASCU 42 on interface Serial7:
Router# debug alps ascu format ipars
Router# debug alps ascu event Serial7 42
ALPS ASCU: T1 expired for ascu 42/2F on i/f Serial7ALPS ASCU: DOWN event while UP for ascu 42/2F on i/f Serial7 : C1 count = 1
Cisco IOS Debug Command Reference - Commands A through D 39
debug aaa accounting through debug auto-configdebug alps ascu
The following output is from the debugalpsascudetail command, showing all protocol events in routerformat for ASCU 42 on interface Serial6:
Router# debug alps ascu format router
Router# debug alps ascu detail Serial6 42
ALPS ASCU: Tx ALC POLL MSG (+ 0 pad bytes) to ascu 42 on i/f Serial6ALPS ASCU: ALC GO AHD MSG rcvd from ascu 42 on i/f Serial6ALPS ASCU: Tx ALC POLL MSG (+ 0 pad bytes) to ascu 42 on i/f Serial6ALPS ASCU: ALC GO AHD MSG rcvd from ascu 42 on i/f Serial6ALPS ASCU: Tx ALC POLL MSG (+ 0 pad bytes) to ascu 42 on i/f Serial6ALPS ASCU: Rx ALC DATA MSG (14 bytes + CCC) from ascu 42 on i/f Serial6, fwd to cktRTP_MATIPALPS ASCU: ALC GO AHD MSG rcvd from ascu 42 on i/f Serial6ALPS ASCU: Tx ALC DATA MSG (14 bytes + CCC + 0 pad bytes) to ascu 42 on i/f Serial6ALPS ASCU: Tx ALC POLL MSG (3 bytes + CCC + 0 pad bytes) to ascu 42 on i/f Serial6
If you specify the ipars or both format for the event or detail tracing level, both the IPARS and routerformats will be displayed.
Note
The following output is from the debugalpsascudetail command, showing all protocol events in both formatfor ASCU 42 on interface Serial6:
Router# debug alps ascu format both
Router# debug alps ascu detail Serial6 42
ALPS ASCU: Tx ALC POLL MSG (+ 0 pad bytes) to ascu 42/2F on i/f Serial6ALPS ASCU: ALC GO AHD MSG rcvd from ascu 42/2F on i/f Serial6ALPS ASCU: Tx ALC POLL MSG (+ 0 pad bytes) to ascu 42/2F on i/f Serial6ALPS ASCU: ALC GO AHD MSG rcvd from ascu 42/2F on i/f Serial6ALPS ASCU: Tx ALC POLL MSG (+ 0 pad bytes) to ascu 42/2F on i/f Serial6ALPS ASCU: Rx ALC DATA MSG (14 bytes + CCC) from ascu 42/2F on i/f Serial6, fwd to cktRTP_MATIPALPS ASCU: ALC GO AHD MSG rcvd from ascu 42/2F on i/f Serial6ALPS ASCU: Tx ALC DATA MSG (14 bytes + CCC + 0 pad bytes) to ascu 42/2F on i/f Serial6ALPS ASCU: Tx ALC POLL MSG (3 bytes + CCC + 0 pad bytes) to ascu 42/2F on i/f Serial6The following output is from the debugalpsascupacket command, showing all packets sent or received inrouter format for ASCU 42 on interface Serial6:
Router# debug alps ascu packet format router Serial6 42
ALPS ASCU: Tx ALC SERVICE MSG (18 bytes + CCC + 0 pad bytes) to ascu 42 on i/f Serial602321D26 0C261616140C0D18 26163135 0611C6ALPS ASCU: Rx ALC DATA MSG (14 bytes + CCC) from ascu 42 on i/f Serial6, fwd cktRTP_MATIP42607866 6571786665717966 755124ALPS ASCU: Tx ALC DATA MSG (14 bytes + CCC + 0 pad bytes) to ascu 42 on i/f Serial6022038 2625313826253139 263511E4The following output is from the debugalpsascupacket command, showing all packets sent or received inipars format for ASCU 42 on interface Serial6:
Router# debug alps ascu packet format ipars Serial6 42
ALPS ASCU: Tx ALC SERVICE MSG (18 bytes + CCC + 0 pad bytes) to ascu 42/2F on i/f Serial6ALPS IPARS Format:2F2C1126 3326252535331339 26251C14 271DC6ALPS ASCU: Rx ALC DATA MSG (14 bytes + CCC) from ascu 42/2F on i/f Serial6, fwd cktRTP_MATIP
Cisco IOS Debug Command Reference - Commands A through D40
debug aaa accounting through debug auto-configdebug alps ascu
ALPS IPARS Format:2F3E3826 161C3826161C1826 141D24ALPS ASCU: Tx ALC DATA MSG (14 bytes + CCC + 0 pad bytes) to ascu 42/2F on i/f Serial6ALPS IPARS Format:2F3E38 26161C3826161C18 26141DE4The following output is from the debugalpsascupacket command, showing all packets sent or received inboth formats for ASCU 42 on interface Serial6:
Router# debug alps ascu packet format both Serial6 42
ALPS ASCU: Tx ALC SERVICE MSG (18 bytes + CCC + 0 pad bytes) to ascu 42/2F on i/f Serial6ALPS Router Format:02321D26 0C261616140C0D18 26163135 0611C6ALPS IPARS Format:2F2C1126 3326252535331339 26251C14 271DC6ALPS ASCU: Rx ALC DATA MSG (14 bytes + CCC) from ascu 42/2F on i/f Serial6, fwd cktRTP_MATIPALPS Router Format:42607866 6571786665717966 755124ALPS IPARS Format:2F3E3826 161C3826161C1826 141D24ALPS ASCU: Tx ALC DATA MSG (14 bytes + CCC + 0 pad bytes) to ascu 42/2F on i/f Serial6ALPS Router Format:022038 2625313826253139 263511E4ALPS IPARS Format:2F3E38 26161C3826161C18 26141DE4
Cisco IOS Debug Command Reference - Commands A through D 41
debug aaa accounting through debug auto-configdebug alps ascu
debug alps circuit eventTo enable event debugging for airline product set (ALPS) circuits, use the debugalpscircuiteventcommandin privileged EXEC mode. To disable debugging output, use the no form of this command.
debug alps circuit event [ name ]
no debug alps circuit event [ name ]
Syntax Description (Optional) Name given to identify an ALPS circuiton the remote customer premises equipment (CPE).
name
Command Default If no circuit name is specified, then debugging is enabled for every ALPS circuit.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.11.3 T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines To enable debugging for a single ALPS circuit, specify the name of the circuit.
To enable debugging for a group of circuits, enter a separate command for each circuit name.
Examples The following is sample output from the debugalpscircuitevent command for circuit RTP_AX25:
alps-rcpe# debug alps circuit event RTP_AX25
ALPS P1024 CKT: FSM - Ckt= RTP_AX25, State= OPEN, Event= DISABLE:(CloseAndDisable)->DISCALPS P1024 CKT: FSM - Ckt= RTP_AX25, State= DISC, Event= ENABLE:(TmrStartNullRetry)->INOPALPS P1024 CKT: Ckt= RTP_AX25, Open - peer set to 200.100.40.2ALPS P1024 CKT: Ckt= RTP_AX25, Open - peer open.ALPS P1024 CKT: FSM - Ckt= RTP_AX25, State= INOP, Event= RETRY_TIMEOUT:(Open)->OPNGALPS P1024 CKT: FSM - Ckt= RTP_AX25, State= OPNG, Event= CKT_OPEN_CFM:(CacheAndFwdAscuData)->OPENalps-ccpe# debug alps circuit event RTP_AX25
ALPS AX.25 FSM: Ckt= RTP_AX25, State= OPEN, Event= CktClose, Rsn= 12:(PvcKill,CktRemove,TmrStartClose)->INOPALPS AX.25 FSM: Ckt= RTP_AX25, State= INOP, Event= X25PvcInact, Rsn= 0:(-,-,-)->INOPALPS AX.25 FSM: Ckt= RTP_AX25, State= INOP, Event= X25VcDeleted, Rsn= 0:
Cisco IOS Debug Command Reference - Commands A through D42
debug aaa accounting through debug auto-configdebug alps circuit event
(-,CktDestroy,TmrStop)->INOPALPS AX.25 FSM: Ckt= RTP_AX25, State= INOP, Event= CktOpReq, Rsn= 4:(PvcMake,CktAdd,TmrStartOpen)->OPNGALPS AX.25 FSM: Ckt= RTP_AX25, State= OPNG, Event= X25ResetTx, Rsn= 0:(-,-,-)->OPNGALPS AX.25 FSM: Ckt= RTP_AX25, State= OPNG, Event= X25VcUp, Rsn= 0:(-,OpnCfm,TmrStop)->OPEN
Cisco IOS Debug Command Reference - Commands A through D 43
debug aaa accounting through debug auto-configdebug alps circuit event
debug alps peerTo enable event or packet debugging for airline product set (ALPS) peers, use the debugalpspeercommandin privileged EXEC mode. To disable debugging output, use the no form of this command.
debug alps peer {event| packet} [ ip-address ]
no debug alps peer {event| packet} [ ip-address ]
Syntax Description Specifies debugging for an event.event
Specifies debugging for a packet.packet
(Optional) Remote peer IP address.ip-address
Command Default If no IP address is specified, then debugging is enabled for every peer connection.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced for limited availability.11.3(6)T
This command was available for general release.12.0(1)
The packet keyword was added. The format for the output was modifiedfor consistency.
12.0(5)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines To enable debugging for a single remote ALPS peer, specify the peer IP address.
To enable debugging for a set of remote peers, enter the command for each peer IP address.
Examples The following is sample output from the debugalpspeerpacket command:
Router# debug alps peer packet
ALPS PEER:Peer (10.227.50.106, MATIP_A_CKT-1) - TX Peer Data Msg (18 bytes)040A5320: 01 00001241040A5330:45546B5F 6F4F7757 67477B5B 51ALPS PEER:Peer (10.227.50.106, MATIP_A_CKT-1) - RX Peer Data Msg (18 bytes)04000550: 01000012 4145546B 5F6F4F7704000560:5767477B 5B51
Cisco IOS Debug Command Reference - Commands A through D44
debug aaa accounting through debug auto-configdebug alps peer
ALPS PEER:Peer (10.227.50.106, MATIP_A_CKT-1) - TX Peer Data Msg (18 bytes)0409F6E0: 01 00001241 45546B5F0409F6F0:6F4F7757 67477B5B 51ALPS PEER:Peer (10.227.50.106, MATIP_A_CKT-1) - RX Peer Data Msg (18 bytes)04000680: 01000012 4145546B04000690:5F6F4F77 5767477B 5B51
Cisco IOS Debug Command Reference - Commands A through D 45
debug aaa accounting through debug auto-configdebug alps peer
debug alps peer eventTo enable event debugging for airline product set (ALPS) peers, use the debugalpspeereventcommand inprivileged EXEC mode. To disable debugging output, use the no form of this command.
debug alps peer event ipaddr
no debug alps peer event ipaddr
Syntax Description Peer IP address.ipaddr
Command Default If no IP address is specified, debugging is enabled for every peer connection.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.11.3 T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines To enable debugging for a single remote ALPS peer, specify the peer IP address.
To enable debugging for a set of remote peers, enter the command for each peer IP address.
Examples The following is sample output from the debugalpspeerevent command:
Router# debug alps peer eventALPS PEER: FSM - Peer 200.100.25.2, Event ALPS_CLOSED_IND, State OPENEDALPS PEER: peer 200.100.25.2 closed - closing peer circuits.ALPS PEER: Promiscuous peer created for 200.100.25.2ALPS PEER: TCP Listen - passive open 200.100.25.2(11003) -> 10000ALPS PEER: FSM - Peer 200.100.25.2, Event ALPS_OPEN_IND, State DISCONNALPS PEER: peer 200.100.25.2 opened OK.
Cisco IOS Debug Command Reference - Commands A through D46
debug aaa accounting through debug auto-configdebug alps peer event
debug alps snmpTo enable debugging for airline product set (ALPS) Simple Network Management Protocol (SNMP) agents,use the debugalpssnmpcommand in privileged EXEC mode. To disable debugging output, use the no formof this command.
debug alps snmp
no debug alps snmp
Syntax Description This command has no arguments or keywords.
Command Default Debugging for SNMP agents is not enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced for limited availability.11.3(6)T
This command was available for general release.12.0(1)T
This command was added to the documentation.12.0(5)T
The output for this command was modified to reflect MIB and SNMPchanges.
12.1(2)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Examples The following output is from the debugalpssnmp command. The first line shows a circuit event status change.The second line shows an ASCU status change. The third line shows a peer connection status change.
Router# debug alps snmp
ALPS CktStatusChange Notification for circuit CKT-1ALPS AscuStatusChange Notification for ascu (Serial3, 41)PeerConnStatusChange Notification for peer (10.227.50.106, MATIP_A_CKT-1)The following output shows that an open failure has occurred on circuit 1:
ALPS CktOpenFailure Notification for circuit CKT1The following output shows that a partial rejection to an ALPS circuit peer open request has occurred oncircuit 1:
ALPS CktPartialReject Notification for ascu (Serial2, 41) on circuit CKT1
Cisco IOS Debug Command Reference - Commands A through D 47
debug aaa accounting through debug auto-configdebug alps snmp
debug ancpTo enable the display of debugging information related to the Access Node Control Protocol (ANCP), usethe debugancpcommand in privileged EXEC mode. To disable debugging output, use the no form of thiscommand.
debug ancp {adjacency| details| errors| events| neighbor| packets [brief]| port-event {details| events}|port-management {details| events}}
no debug ancp {adjacency| details| errors| events| neighbor| packets [brief]| port-event {details| events}|port-management {details| events}}
Syntax Description Displays information about adjacency messages onan ANCP server.
adjacency
Displays detailed static configuration informationrelating to ANCP and dynamic line conditions.
details
Displays information about ANCP protocol errors.errors
Displays information about ANCP protocol events.events
Displays information about ANCP neighbors.neighbor
Displays information about ANCP control packets.packets
(Optional) Displays static configuration informationfor ANCP control packets.
brief
Displays ANCP event messages (port up and portdown) related to data ports.
port-event
Displays ANCP operations, administration, andmaintenance (OAM) messages.
port-management
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced on the Cisco 10000 series router.12.2(28)ZV
This command was modified. L2CP was replaced with ANCP.12.2(31)ZV1
This command was integrated into Cisco IOS XE Release 2.4.Cisco IOS XE Release 2.4
Cisco IOS Debug Command Reference - Commands A through D48
debug aaa accounting through debug auto-configdebug ancp
ModificationRelease
This commandwasmodified. The port-event and port-managementkeywords were added.
Cisco IOS XE Release 3.2S
Usage Guidelines You can use the debugconditioninterface command to conditionalize all the debug commands where theANCP TCP connections are terminated.
Examples The following is sample output from the debugancpadjacency command. The output fields are self-explanatory.
Router# debug ancp adjacency*Sep 20 08:23:53.833: Sending adj (SYN) msg nbr_info 0 nbr 10.1.1.1/46459 tcb 50C2050*Sep 20 08:23:53.834: ANCP: Using Mac address aabb.cc00.7a00*Sep 20 08:23:53.834: ANCP : Sending adj (SYN) msg to writeQ, msg len 48 interfaceEthernet0/0.1 TCB 50C2050*Sep 20 08:23:53.836: ANCP: Received adjacency (SYN) message, from 10.1.1.1 port 46459 tcb50C2050*Sep 20 08:23:53.836: ANCP: 2 capability tlv(s) received*Sep 20 08:23:53.837: Capability received (mask) : 9*Sep 20 08:23:53.837: Sending adj (SYNACK) msg nbr_info 6368300 nbr 10.1.1.1/46459 tcb50C2050*Sep 20 08:23:53.837: ANCP: Using Mac address aabb.cc00.7a00*Sep 20 08:23:53.837: ANCP : Sending adj (SYNACK) msg to writeQ, msg len 48 interfaceEthernet0/0.1 TCB 50C2050*Sep 20 08:23:53.837: ANCP ADJ: received SYN from nbr, state SYNSENT Sending SYNACK tonbr. State transitons to SYNRCVD*Sep 20 08:23:53.841: ANCP: Received adjacency (SYNACK) message, from 10.1.1.1 port 46459tcb 50C2050*Sep 20 08:23:53.842: ANCP: 2 capability tlv(s) received*Sep 20 08:23:53.842: Capability received (mask) : 9*Sep 20 08:23:53.842: Sending adj (ACK) msg nbr_info 6368300 nbr 10.1.1.1/46459 tcb 50C2050*Sep 20 08:23:53.842: ANCP: Using Mac address aabb.cc00.7a00The following is sample output from the debugancpevents command:
Router# debug ancp eventsANCP protocol events debugging is onANCP: TCP accepted on address 10.1.1.2 for remote peer 10.1.1.1Sending adj msg, code 1 nbr_info 0 nbr 10.1.1.1/40224 tcb 549D930TCP read_notify called, calling ancp_io_read_request. ANCP IO should service the read requestANCP: Received adjacency message, code 1 Src 10.1.1.1 Src port 40224 tcb 549D930ANCP: 2 capability tlv(s) receivedSending adj msg, code 2 nbr_info 5FA92F0 nbr 10.1.1.1/40224 tcb 549D930ANCP ADJ: received SYN from nbr, state SYNSENT Sending SYNACK to nbr. State transitons toSYNRCVDTCP read_notify called, calling ancp_io_read_request. ANCP IO should service the read requestANCP: Received adjacency message, code 2 Src 10.1.1.1 Src port 40224 tcb 549D930ANCP: 2 capability tlv(s) receivedSending adj msg, code 3 nbr_info 5FA92F0 nbr 10.1.1.1/40224 tcb 549D930ANCP ADJ: received SYNACK from nbr, state SYNRCVD Sending ACK to nbr. State transtions toESTABTCP read_notify called, calling ancp_io_read_request. ANCP IO should service the read requestANCP: Received adjacency message, code 3 Src 10.1.1.1 Src port 40224 tcb 549D930ANCP: 2 capability tlv(s) receivedANCP ADJ: received ACK from nbr, state ESTAB Sending ACK to nbr thou timer. State staysESTABTCP read_notify called, calling ancp_io_read_request. ANCP IO should service the read requestSending adj msg, code 3 nbr_info 5FA92F0 nbr 10.1.1.1/40224 tcb 549D930ANCP: Received adjacency message, code 3 Src 10.1.1.1 Src port 40224 tcb 549D930ANCP: 2 capability tlv(s) receivedANCP ADJ: received ACK from nbr, state ESTAB Sending ACK to nbr thou timer. State staysESTABSending adj msg, code 3 nbr_info 5FA92F0 nbr 10.1.1.1/40224 tcb 549D930TCP read_notify called, calling ancp_io_read_request. ANCP IO should service the read request
Cisco IOS Debug Command Reference - Commands A through D 49
debug aaa accounting through debug auto-configdebug ancp
ANCP: Received adjacency message, code 3 Src 10.1.1.1 Src port 40224 tcb 549D930ANCP: 2 capability tlv(s) receivedANCP ADJ: received ACK from nbr, state ESTAB Sending ACK to nbr thou timer. State staysESTABThe table below describes the significant fields shown in the display.
Table 4: debug ancp events Field Descriptions
DescriptionField
Adjacency message received from the ANCPneighbor. Adjacency protocol messages synchronizethe Network Access Server and access nodes.
Received adjacency message
Supported capability type-length-values are includedin the adjacency message.
2 capability tlv(s) received
The following is sample output from the debugancpport-eventdetailscommand. The output fields areself-explanatory.
Router# debug ancp port-event details*Sep 20 08:24:55.608: ANCP: Found db entry based on access-loop-circuit-id alcid1, receivedin Port UP message*Sep 20 08:24:55.608: Advance 12 bytes (aligned) to next TLV.*Sep 20 08:24:55.609: ANCP: Processing DSL_LINE_ATTRIBUTES sub-TLVs: PORT UP*Sep 20 08:24:55.609: ANCP: Port UP: received DSL Line Attrs, tlv length in msg 32 alignedlen 32*Sep 20 08:24:55.609: DSL_TYPE received. 4*Sep 20 08:24:55.609: Advance 8 bytes (aligned) to next sub-TLV.*Sep 20 08:24:55.609: ACTUAL_DATA_RATE_UP received. 7878*Sep 20 08:24:55.609: Advance 8 bytes (aligned) to next sub-TLV.*Sep 20 08:24:55.609: ACTUAL_DATA_RATE_DN received. 9090*Sep 20 08:24:55.610: Advance 8 bytes (aligned) to next sub-TLV.*Sep 20 08:24:55.610: DSL_LINE_STATE received. 1*Sep 20 08:24:55.610: Advance 8 bytes (aligned) to next sub-TLV.*Sep 20 08:24:55.610: Advance 36 bytes (aligned) to next TLV.The following is sample output from the debugancpport-managementdetailscommand. The output fieldsare self-explanatory.
Router# debug ancp port-management details*Sep 20 08:29:22.263:3120 35000000 00008001 00340000 00000000 00000000 00000000 09000000 00000020 05000001 00100001 0006616C 63696431 0000*Sep 20 08:29:22.266: ANCP_PORT_MGMT: Ethernet0/0.1 Port Mgmt message, Total TLVs : 1*Sep 20 08:29:22.266: ANCP_PORT_MGMT: Received Access-Loop-Cir-ID alcid1*Sep 20 08:29:22.266: ANCP_PORT_MGMT: Received Result: success(0x3) Code: Specified accessline does not exist(0x500).*Sep 20 08:29:22.266: Advance 12 bytes (aligned) to next TLV.
Cisco IOS Debug Command Reference - Commands A through D50
debug aaa accounting through debug auto-configdebug ancp
Related Commands DescriptionCommand
Limits the output for some debug commands on thebasis of interface, VC, or VLAN.
debug condition interface
Displays statistics of ANCP neighbor informationand neighborship information with local ANCP ports.
show ancp neighbor
Displays ANCP-related information for the ANCPendpoints configured on a BRAS interface.
show ancp status
Cisco IOS Debug Command Reference - Commands A through D 51
debug aaa accounting through debug auto-configdebug ancp
debug appfwTo display debug messages about Cisco IOS Firewall events, use the debugappfwcommand in privilegedEXEC mode. To disable debugging output, use the no form of this command.
debug appfw {application protocol| function-trace| object-creation| object-deletion| events| timers|detailed}
no debug appfw {application protocol| function-trace| object-creation| object-deletion| events| timers|detailed}
Syntax Description Displays messages about protocol events offirewall-inspected applications, including details aboutthe protocol’s packets. Currently, the only supportedprotocol is HTTP. (Issue the http keyword.)
application protocol
Displays messages about software functions calledby Cisco IOS Firewall.
function-trace
Displays messages about software objects that arebeing created by Cisco IOS Firewall. Cisco IOSFirewall-inspected sessions begin when the object iscreated.
object-creation
Displays messages about software objects that arebeing deleted by Cisco IOS Firewall. Cisco IOSFirewall-inspected sessions close when the object isdeleted.
object-deletion
Displays messages about Cisco IOS software events,including Cisco IOS Firewall packet processing.
events
Displays messages about Cisco IOS Firewall timerevents, such as an idle timeout by the Cisco IOSFirewall.
timers
Detailed information for all other enabled Cisco IOSFirewall debugging is displayed.
This keyword should be used in conjunctionwith other Cisco IOS Firewall debuggingcommands.
Note
detailed
Command Modes Privileged EXEC
Cisco IOS Debug Command Reference - Commands A through D52
debug aaa accounting through debug auto-configdebug appfw
Command History ModificationRelease
This command was introduced.12.3(14)T
Examples The following sample configuration shows how to configure an HTTP policy with application firewalldebugging enabled:
Router(config)# appfw policy-name myPolicyAPPFW FUNC:appfw_policy_findAPPFW FUNC:appfw_policy_find -- Policy myPolicy is not foundAPPFW FUNC:appfw_policy_allocAPPFW FUNC:appfw_policy_alloc -- policy_alloc 0x65727278APPFW FUNC:appfw_policy_alloc -- Policy 0x65727278 is set to validAPPFW FUNC:appfw_policy_alloc -- Policy myPolicy has been createdAPPFW FUNC:appfw_policy_command -- memlock policy 0x65727278
! Debugging sample for application (HTTP) creation
Router(cfg-appfw-policy)# application httpAPPFW FUNC:appfw_http_command
APPFW FUNC:appfw_http_appl_findAPPFW FUNC:appfw_http_appl_find -- Application not foundAPPFW FUNC:appfw_http_appl_allocAPPFW FUNC:appfw_http_appl_alloc -- appl_http 0x64D7A25CAPPFW FUNC:appfw_http_appl_alloc -- Application HTTP parser structure 64D7A25C created! Debugging sample for HTTP-specific application inspectionRouter(cfg-appfw-policy-http)#Router(cfg-appfw-policy-http)# strict-http action reset alarmAPPFW FUNC:appfw_http_subcommandAPPFW FUNC:appfw_http_subcommand -- strict-http cmd turned onRouter# debug appfw detailed
APPFW Detailed Debug debugging is onfw7-7206a#debug appfw object-creationAPPFW Object Creations debugging is onfw7-7206a#debug appfw object-deletionAPPFW Object Deletions debugging is on
Cisco IOS Debug Command Reference - Commands A through D 53
debug aaa accounting through debug auto-configdebug appfw
debug apple arpTo enable debugging of the AppleTalk Address Resolution Protocol (AARP), use the debugapplearp commandin privileged EXEC mode. To disable debugging output, use the no form of this command.
debug apple arp [type number]
no debug apple arp [type number]
Syntax Description (Optional) Interface type.type
(Optional) Interface number.number
Command Modes Privileged EXEC
Usage Guidelines This command is helpful when you experience problems communicating with a node on the network youcontrol (a neighbor). If the debugapplearp display indicates that the router is receiving AARP probes, youcan assume that the problem does not reside at the physical layer.
Examples The following is sample output from the debugapplearp command:
Router# debug apple arpEther0: AARP: Sent resolve for 4160.26Ether0: AARP: Reply from 4160.26(0000.0c00.0453) for 4160.154(0000.0c00.8ea9)Ether0: AARP: Resolved waiting request for 4160.26(0000.0c00.0453)Ether0: AARP: Reply from 4160.19(0000.0c00.0082) for 4160.154(0000.0c00.8ea9)Ether0: AARP: Resolved waiting request for 4160.19(0000.0c00.0082)Ether0: AARP: Reply from 4160.19(0000.0c00.0082) for 4160.154(0000.0c00.8ea9)Explanations for representative lines of output follow.
The following line indicates that the router has requested the hardware MAC address of the host at networkaddress 4160.26:
Ether0: AARP: Sent resolve for 4160.26The following line indicates that the host at network address 4160.26 has replied, giving its MAC address(0000.0c00.0453). For completeness, the message also shows the network address to which the reply was sentand its hardware MAC address (also in parentheses).
Ether0: AARP: Reply from 4160.26(0000.0c00.0453) for 4160.154(0000.0c00.8ea9)The following line indicates that the MAC address request is complete:
Ether0: AARP: Resolved waiting request for 4160.26(0000.0c00.0453)
Cisco IOS Debug Command Reference - Commands A through D54
debug aaa accounting through debug auto-configdebug apple arp
debug apple domainTo enable debugging of the AppleTalk domain activities, use the debugappledomaincommand in privilegedEXEC mode. To disable debugging output, use the no form of this command.
debug apple domain
no debug apple domain
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines Use the debugappledomain command to observe activity for domains and subdomains. Use this commandin conjunction with the debugappleremap command to observe interaction between remapping and domainactivity. Messages are displayed when the state of a domain changes, such as creating a new domain, deletinga domain, and updating a domain.
Examples The following is sample output from the debugappledomain command intermixed with output from thedebugappleremap command; the two commands show related events:
Router# debug apple domainRouter# debug apple remapAT-REMAP: RemapProcess for net 30000 domain AURP Domain 1AT-REMAP: ReshuffleRemapList for subdomain 1AT-REMAP: Could not find a remap for cable 3000-3001AT-DOMAIN: atdomain_DisablePort for Tunnel0AT-DOMAIN: CleanUpDomain for domain 1 [AURP Domain 1]AT-DOMAIN: Disabling interface Ethernet1AT-DOMAIN: atdomain_DisablePort for Ethernet1AT-DOMAIN: CleanUpDomain for domain 1 [AURP Domain 1]AT-DOMAIN: CleanSubDomain for inbound subdomain 1AT-REMAP: Remap for net 70 inbound subdomain 1 has been deletedAT-DOMAIN: DeleteAvRemapList for inbound subdomain 1AT-DOMAIN: DeleteRemapTable for subdomain 1AT-DOMAIN: DeleteAvRemapList for inbound subdomain 1AT-DOMAIN: CleanSubDomain for outbound subdomain 1AT-DOMAIN: DeleteRemapTable for subdomain 1AT-REMAP: RemapProcess for net 30000 domain AURP Domain 1 Remapped Net 10000AT-REMAP: Remap for net 50 outbound subdomain 1 has been deletedAT-DOMAIN: DeleteAvRemapList for outbound subdomain 1AT-DOMAIN: DeleteAvRemapList for outbound subdomain 1AT-DOMAIN: CleanUpDomain for domain 1 [AURP Domain 1]AT-DOMAIN: CleanSubDomain for inbound subdomain 1AT-DOMAIN: DeleteRemapTable for subdomain 1AT-DOMAIN: DeleteAvRemapList for inbound subdomain 1AT-DOMAIN: CleanSubDomain for outbound subdomain 1AT-DOMAIN: DeleteRemapTable for subdomain 1AT-DOMAIN: DeleteAvRemapList for outbound subdomain 1
Related Commands DescriptionCommand
Enables debugging of the AppleTalk remap activities.debug apple remap
Cisco IOS Debug Command Reference - Commands A through D 55
debug aaa accounting through debug auto-configdebug apple domain
Cisco IOS Debug Command Reference - Commands A through D56
debug aaa accounting through debug auto-configdebug apple domain
debug apple eigrp-allTo enable debugging output from the Enhanced IGRP routines, use the debugappleeigrp-allprivileged EXECcommand. The no form of this command disables debugging output.
debug apple eigrp-all
no debug apple eigrp-all
Syntax Description This command has no arguments or keywords.
Command History ModificationRelease
This command was introduced.10.0
This command is no longer supported in Cisco IOS Mainline relesaes or inTechnology-based(T-train) releases. It might continue to appear in 12.2S-familyreleases.
12.2(13)T
Usage Guidelines The debugappleeigrp-all command can be used to monitor acquisition of routes, aging route table entries,and advertisement of known routes through Enhanced IGRP.
Because the debugappleeigrp-all command can generate many messages, use it only when the CPUutilization of the router is less than 50 percent.
Caution
Examples The following is sample output from the debugappleeigrp-allcommand:
Router# debug apple eigrp-all3:54:34: atigrp2_router: peer is 83.1953:54:37: AT: atigrp2_write: about to send packet3:54:37: Ethernet2: output AT packet: enctype UNKNOWN, size 653:54:37: 07FFFFFF0000FFFFFFFFFFFF00000C1485B00046|0041ACD100000053FF8F585858020591103:54:37: 000000000000000000000000000000010001000C010001000000000F0204000C00530053003:54:37: AT: atigrp2, src=Ethernet2:83.143, dst=83-83, size=52, EIGRP pkt sent3:54:39: atigrp2_router: peer is 83.1953:54:42: AT: atigrp2_write: about to send packet3:54:42: Ethernet2: output AT packet: enctype UNKNOWN, size 653:54:42: 07FFFFFF0000FFFFFFFFFFFF00000C1485B00046|0041ACD100000053FF8F585858020591103:54:42: 000000000000000000000000000000010001000C010001000000000F0204000C00530053003:54:42: AT: atigrp2, src=Ethernet2:83.143, dst=83-83, size=52, EIGRP pkt sentThe table below describes the significant fields shown in the display.
Table 5: debug apple eigrp Field Descriptions
DescriptionField
AppleTalk address of the neighbor.atigrp2_router:
Cisco IOS Debug Command Reference - Commands A through D 57
debug aaa accounting through debug auto-configdebug apple eigrp-all
DescriptionField
Indicates that this is an AppleTalk packet.AT:
Name of the interface through which the routerreceived the packet.
Ethernet2:
Name of the interface sending the Enhanced IGRPpacket, as well at its AppleTalk address.
src=
Cable range of the destination of the packet.dst=
Size of the packet (in bytes).size=
Cisco IOS Debug Command Reference - Commands A through D58
debug aaa accounting through debug auto-configdebug apple eigrp-all
debug apple errorsTo display errors occurring in the AppleTalk network, use the debugappleerrors command in privilegedEXEC mode. To disable debugging output, use the no form of this command.
debug apple errors [type number]
no debug apple errors [type number]
Syntax Description (Optional) Interface type.type
(Optional) Interface number.number
Command Modes Privileged EXEC
Usage Guidelines In a stable AppleTalk network, the debugappleerrors command produces little output.
To solve encapsulation problems, enable debugappleerrors and debugapplepacket together.
Examples The following is sample output from the debugappleerrors command when a router is brought up with azone that does not agree with the zone list of other routers on the network:
Router# debug apple errors%AT-3-ZONEDISAGREES: Ethernet0: AppleTalk port disabled; zone list incompatible with 4160.19%AT-3-ZONEDISAGREES: Ethernet0: AppleTalk port disabled; zone list incompatible with 4160.19%AT-3-ZONEDISAGREES: Ethernet0: AppleTalk port disabled; zone list incompatible with 4160.19
As the output suggests, a single error message indicates zone list incompatibility; this message is sent outperiodically until the condition is corrected or the debugappleerrors command is turned off.
Most of the other messages that the debugappleerrors command can generate are obscure or indicate a seriousproblem with the AppleTalk network. Some of these other messages follow.
In the following message, RTMPRsp, RTMPReq, ATP, AEP, ZIP, ADSP, or SNMP could replace NBP, and"llap dest not for us" could replace "wrong encapsulation":
Packet discarded, src 4160.12-254,dst 4160.19-254,NBP,wrong encapsulationIn the following message, in addition to an invalid echo packet error, other possible errors are unsolicitedAEP echo reply, unknown echo function, invalid ping packet, unknown ping function, and bad responderpacket type:
Ethernet0: AppleTalk packet error; no source address availableAT: pak_reply: dubious reply creation, dst 4160.19AT: Unable to get a buffer for reply to 4160.19Processing error, src 4160.12-254,dst 4160.19-254,AEP, invalid echo packet
Cisco IOS Debug Command Reference - Commands A through D 59
debug aaa accounting through debug auto-configdebug apple errors
The debugappleerrors command can print out additional messages when other debugging commands arealso turned on.When you turn on both the debugappleerrors and debugappleeventscommands, the followingmessage can be generated:
Proc err, src 4160.12-254,dst 4160.19-254,ZIP,NetInfo Reply format is invalidIn the preceding message, in addition to the NetInfo Reply format is invalid error, other possible errors areNetInfoReply not for me, NetInfoReply ignored, NetInfoReply for operational net ignored, NetInfoReplyfrom invalid port, unexpected NetInfoReply ignored, cannot establish primary zone, no primary has been setup, primary zone invalid, net information mismatch, multicast mismatch, and zones disagree.
When you turn on both the debugappleerrors and debugapplenbpcommands, the following message canbe generated:
Processing error,...,NBP,NBP name invalidIn the preceding message, in addition to the NBP name invalid error, other possible errors are NBP typeinvalid, NBP zone invalid, not operational, error handling brrq, error handling proxy, NBP fwdreq unexpected,No route to srcnet, Proxy to "*" zone, Zone "*" from extended net, No zone info for "*", and NBP zoneunknown.
When you turn on both the debugappleerrors and debugappleroutingcommands, the following messagecan be generated:
Processing error,...,RTMPReq, unknown RTMP requestIn the preceding message, in addition to an unknown RTMP request error, other possible errors are RTMPpacket header bad, RTMP cable mismatch, routed RTMP data, RTMP bad tuple, and Not Req or Rsp.
Cisco IOS Debug Command Reference - Commands A through D60
debug aaa accounting through debug auto-configdebug apple errors
debug apple eventsTo display information about AppleTalk special events, neighbors becoming reachable or unreachable, andinterfaces going up or down, use the debugappleevents command in privileged EXEC mode. To disabledebugging output, use the no form of this command.
debug apple events [type number]
no debug apple events [type number]
Syntax Description (Optional) Interface type.type
(Optional) Interface number.number
Command Modes Privileged EXEC
Usage Guidelines Only significant events (for example, neighbor and route changes) are logged.
The debugappleevents command is useful for solving AppleTalk network problems because it provides anoverall picture of the stability of the network. In a stable network, the debugappleevents command does notreturn any information. If the command generates numerous messages, those messages can indicate possiblesources of the problems.
When configuring or making changes to a router or interface for AppleTalk, enable the debugappleeventscommand to alert you to the progress of the changes or to any errors that might result. Also use this commandperiodically when you suspect network problems.
The debugappleevents command is also useful to determine whether network flapping (nodes toggling onlineand offline) is occurring. If flapping is excessive, look for routers that only support 254 networks.
When you enable the debugappleeventscommand, you will see any messages that theappleevent-loggingconfiguration command normally displays. Turning on the debugappleeventscommand,however, does not cause the appleevent-loggingcommand to be maintained in nonvolatile memory. Onlyturning on the appleevent-logging command explicitly stores it in nonvolatile memory. Furthermore, if theappleevent-logging command is already enabled, turning on or off the debugappleevents command doesnot affect the appleevent-logging command.
Examples The debugappleevents command is useful in tracking the discovery mode state changes through which aninterface progresses. When no problems are encountered, the state changes progress as follows:
1 Line down.
2 Restarting.
3 Probing (for its own address [node ID] using AARP).
4 Acquiring (sending out GetNetInfo requests).
5 Requesting zones (the list of zones for its cable).
Cisco IOS Debug Command Reference - Commands A through D 61
debug aaa accounting through debug auto-configdebug apple events
6 Verifying (that the router’s configuration is correct. If not, a port configuration mismatch is declared).
7 Checking zones (to make sure its list of zones is correct).
8 Operational (participating in routing).
Explanations for individual lines of output follow.
The following message indicates that a port is set. In this case, the zone multicast address is being reset.
Ether0: AT: Resetting interface address filtersThe following messages indicate that the router is changing to restarting mode:
%AT-5-INTRESTART: Ether0: AppleTalk port restarting; protocol restartedEther0: AppleTalk state changed; unknown -> restartingThe following message indicates that the router is probing in the startup range of network numbers (65280to 65534) to discover its network number:
Ether0: AppleTalk state changed; restarting -> probingThe following message indicates that the router is enabled as a nonrouting node using a provisional networknumber within its startup range of network numbers. This type of message only appears if the network addressthe router will use differs from its configured address. This is always the case for a discovery-enabled router;it is rarely the case for a nondiscovery-enabled router.
%AT-6-ADDRUSED: Ether0: AppleTalk node up; using address 65401.148The following messages indicate that the router is sending out GetNetInfo requests to discover the defaultzone name and the actual network number range in which its network number can be chosen:
Ether0: AppleTalk state changed; probing -> acquiring%AT-6-ACQUIREMODE: Ether0: AT port initializing; acquiring net configurationNow that the router has acquired the cable configuration information, the following message indicates that itrestarts using that information:
Ether0: AppleTalk state changed; acquiring -> restartingThe following messages indicate that the router is probing for its actual network address:
Ether0: AppleTalk state changed; restarting -> line downEther0: AppleTalk state changed; line down -> restartingEther0: AppleTalk state changed; restarting -> probingThe following message indicates that the router has found an actual network address to use:
%AT-6-ADDRUSED: Ether0: AppleTalk node up; using address 4160.148The following messages indicate that the router is sending out GetNetInfo requests to verify the default zonename and the actual network number range from which its network number can be chosen:
Ether0: AppleTalk state changed; probing -> acquiring%AT-6-ACQUIREMODE: Ether0: AT port initializing; acquiring net configurationThe following message indicates that the router is requesting the list of zones for its cable:
Ether0: AppleTalk state changed; acquiring -> requesting zonesThe following messages indicate that the router is sending out GetNetInfo requests to make sure itsunderstanding of the configuration is correct:
Ether0: AppleTalk state changed; requesting zones -> verifyingAT: Sent GetNetInfo request broadcast on Ethernet0
Cisco IOS Debug Command Reference - Commands A through D62
debug aaa accounting through debug auto-configdebug apple events
The following message indicates that the router is rechecking its list of zones for its cable:
Ether0: AppleTalk state changed; verifying -> checking zonesThe following message indicates that the router is now fully operational as a routing node and can beginrouting:
Ether0: AppleTalk state changed; checking zones -> operationalA nondiscovery-enabled router can come up when no other router is on the wire; however, it must assumethat its configuration (if accurate syntactically) is correct, because no other router can verify it. Notice thatthe last line indicates this situation.
The following is sample output from the debugappleevents command that describes a discovery-enabledrouter coming up when there is no seed router on the wire:
Router# debug apple eventsEther0: AT: Resetting interface address filters%AT-5-INTRESTART: Ether0: AppleTalk port restarting; protocol restartedEther0: AppleTalk state changed; unknown -> restartingEther0: AppleTalk state changed; restarting -> probing%AT-6-ADDRUSED: Ether0: AppleTalk node up; using address 65401.148Ether0: AppleTalk state changed; probing -> acquiringAT: Sent GetNetInfo request broadcast on Ether0AT: Sent GetNetInfo request broadcast on Ether0AT: Sent GetNetInfo request broadcast on Ether0AT: Sent GetNetInfo request broadcast on Ether0AT: Sent GetNetInfo request broadcast on Ether0When you attempt to bring up a nonseed router without a seed router on the wire, it never becomes operational;instead, it hangs in the acquiring mode and continues to send out periodic GetNetInfo requests.
When a nondiscovery-enabled router is brought up on an AppleTalk internetwork that is in compatibilitymode (set up to accommodate extended as well as nonextended AppleTalk) and the router has violatedinternetwork compatibility:
The following three configuration command lines indicate the part of the configuration of the router thatcaused the configuration mismatch:
lestat(config)# interface ethernet 0lestat(config-if)# apple cab 41-41lestat(config-if)# apple zone MarketingThe router shown had been configured with a cable range of 41-41 instead of 40-40, which would have beenaccurate. Additionally, the zone name was configured incorrectly; it should have been "Marketing," ratherthan being misspelled as "Markting."
Cisco IOS Debug Command Reference - Commands A through D 63
debug aaa accounting through debug auto-configdebug apple events
debug apple nbpTo display debugging output from the Name Binding Protocol ( NBP) routines, use the debugapplenbpcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug apple nbp [type number]
no debug apple nbp [type number]
Syntax Description (Optional) Interface type.type
(Optional) Interface number.number
Command Modes Privileged EXEC
Usage Guidelines To determine whether the router is receiving NBP lookups from a node on the AppleTalk network, enabledebugapplenbp at each node between the router and the node in question to determine where the problemlies.
Because the debugapplenbp command can generate manymessages, use it only when the CPU utilizationof the router is less than 50 percent.
Caution
Examples The following is sample output from the debugapplenbp command:
Router# debug apple nbpAT: NBP ctrl = LkUp, ntuples = 1, id = 77AT: 4160.19, skt 2, enum 0, name: =:ciscoRouter@Low End SW LabAT: LkUp =:ciscoRouter@Low End SW LabAT: NBP ctrl = LkUp-Reply, ntuples = 1, id = 77AT: 4160.154, skt 254, enum 1, name: lestat.Ether0:ciscoRouter@Low End SW LabAT: NBP ctrl = LkUp, ntuples = 1, id = 78AT: 4160.19, skt 2, enum 0, name: =:IPADDRESS@Low End SW LabAT: NBP ctrl = LkUp, ntuples = 1, id = 79AT: 4160.19, skt 2, enum 0, name: =:IPGATEWAY@Low End SW LabAT: NBP ctrl = LkUp, ntuples = 1, id = 83AT: 4160.19, skt 2, enum 0, name: =:ciscoRouter@Low End SW LabAT: LkUp =:ciscoRouter@Low End SW LabAT: NBP ctrl = LkUp, ntuples = 1, id = 84AT: 4160.19, skt 2, enum 0, name: =:IPADDRESS@Low End SW LabAT: NBP ctrl = LkUp, ntuples = 1, id = 85AT: 4160.19, skt 2, enum 0, name: =:IPGATEWAY@Low End SW LabAT: NBP ctrl = LkUp, ntuples = 1, id = 85AT: 4160.19, skt 2, enum 0, name: =:IPGATEWAY@Low End SW LabThe first three lines describe an NBP lookup request:
AT: NBP ctrl = LkUp, ntuples = 1, id = 77AT: 4160.19, skt 2, enum 0, name: =:ciscoRouter@Low End SW LabAT: LkUp =:ciscoRouter@Low End SW Lab
Cisco IOS Debug Command Reference - Commands A through D64
debug aaa accounting through debug auto-configdebug apple nbp
The table below describes the fields in the first line of output.
Table 6: debug apple nbp Field Descriptions--First Line of Output
DescriptionField
Indicates that this message describes an AppleTalkNBP packet.
AT: NBP
Identifies the type of NBP packet. Possible values areas follows:
• LkUp--NBP lookup request.
• LkUp-Reply--NBP lookup reply.
ctrl = LkUp
Indicates the number of name-address pairs in thelookup request packet. Range: 1 to 31 tuples.
ntuples = 1
Identifies an NBP lookup request value.id = 77
The table below describes the fields in the second line of output.
Table 7: debug apple nbp Field Descriptions--Second Line of Output
DescriptionField
Indicates that this message describes an AppleTalkpacket.
AT:
Indicates the network address of the requester.4160.19
Indicates the internet socket address of the requester.The responder will send the NBP lookup reply to thissocket address.
skt 2
Indicates the enumerator field. Used to identifymultiple names registered on a single socket. Eachtuple is assigned its own enumerator, incrementingfrom 0 for the first tuple.
enum 0
Cisco IOS Debug Command Reference - Commands A through D 65
debug aaa accounting through debug auto-configdebug apple nbp
DescriptionField
Indicates the entity name for which a network addresshas been requested. The AppleTalk entity nameincludes three components:
• Object (in this case, a wildcard character [=],indicating that the requester is requestingname-address pairs for all objects of thespecified type in the specified zone).
• Type (in this case, ciscoRouter).
• Zone (in this case, Low End SW Lab).
name: =:ciscoRouter@Low End SW Lab
The third line in the output essentially reiterates the information in the two lines above it, indicating that alookup request has been made regarding name-address pairs for all objects of the ciscoRouter type in the LowEnd SW Lab zone.
Because the router is defined as an object of type ciscoRouter in zone Low End SW Lab, the router sends anNBP lookup reply in response to this NBP lookup request. The following two lines of output show the responseof the router:
AT: NBP ctrl = LkUp-Reply, ntuples = 1, id = 77AT: 4160.154, skt 254, enum 1, name: lestat.Ether0:ciscoRouter@Low End SW LabIn the first line, ctrl = LkUp-Reply identifies this NBP packet as an NBP lookup request. The same value inthe id field (id = 77) associates this lookup reply with the previous lookup request. The second line indicatesthat the network address associated with the entity name of the router (lestat.Ether0:ciscoRouter@Low EndSW Lab) is 4160.154. The fact that no other entity name/network address is listed indicates that the responderonly knows about itself as an object of type ciscoRouter in zone Low End SW Lab.
Cisco IOS Debug Command Reference - Commands A through D66
debug aaa accounting through debug auto-configdebug apple nbp
debug apple packetTo display per-packet debugging output, use the debugapplepacket command in privileged EXEC mode.To disable debugging output, use the no form of this command.
debug apple packet [type number]
no debug apple packet [type number]
Syntax Description (Optional) Interface type.type
(Optional) Interface number.number
Command Modes Privileged EXEC
Usage Guidelines With this command, you can monitor the types of packets being slow switched. It displays at least one lineof debugging output per AppleTalk packet processed.
The output reports information online when a packet is received or a transmission is attempted.
When invoked in conjunction with the debugapplerouting, debugapplezip, and debugapplenbp commands,thedebugapplepacket command adds protocol processing information in addition to generic packet details.It also reports successful completion or failure information.
When invoked in conjunction with the debugappleerrors command, the debugapplepacket command reportspacket-level problems, such as those concerning encapsulation.
Because the debugapplepacket command can generate many messages, use it only when the CPUutilization of the router is less than 50 percent.
Caution
Examples The following is sample output from the debugapplepacket command:
Router# debug apple packetEther0: AppleTalk packet: enctype SNAP, size 60, encaps000000000000000000000000AT: src=Ethernet0:4160.47, dst=4160-4160, size=10, 2 rtes, RTMP pkt sentAT: ZIP Extended reply rcvd from 4160.19AT: ZIP Extended reply rcvd from 4160.19AT: src=Ethernet0:4160.47, dst=4160-4160, size=10, 2 rtes, RTMP pkt sentEther0: AppleTalk packet: enctype SNAP, size 60, encaps000000000000000000000000Ether0: AppleTalk packet: enctype SNAP, size 60, encaps000000000000000000000000The table below describes the fields in the first line of output.
Cisco IOS Debug Command Reference - Commands A through D 67
debug aaa accounting through debug auto-configdebug apple packet
Table 8: debug apple packet Field Descriptions--First Line of Output
DescriptionField
Name of the interface through which the routerreceived the packet.
Ether0:
Indicates that this is an AppleTalk packet.AppleTalk packet
Encapsulation type for the packet.enctype SNAP
Size of the packet (in bytes).size 60
Encapsulation.encaps000000000000000000000000
The table below describes the fields in the second line of output.
Table 9: debug apple packet Field Descriptions--Second Line of Output
DescriptionField
Indicates that this is an AppleTalk packet.AT:
Name of the interface sending the packet and itsAppleTalk address.
src=Ethernet0:4160.47
Cable range of the destination of the packet.dst=4160-4160
Size of the packet (in bytes.)size=10
Indicates that two routes in the routing table link thesetwo addresses.
2 rtes
Type of packet sent.RTMP pkt sent
The third line indicates the type of packet received and its source AppleTalk address. This message is repeatedin the fourth line because AppleTalk hosts can send multiple replies to a given GetNetInfo request.
Cisco IOS Debug Command Reference - Commands A through D68
debug aaa accounting through debug auto-configdebug apple packet
debug apple remapTo enable debugging of the AppleTalk remap activities, use the debugappleremapcommand in privilegedEXEC mode. To disable debugging output, use the no form of this command.
debug apple remap
no debug apple remap
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines Use the debugappleremapcommand with the debugappledomain command to observe activity betweendomains and subdomains. Messages from the debugappleremap command are displayed when a particularremapping function occurs, such as creating remaps or deleting remaps.
Examples The following is sample output from the debugappleremap command intermixed with output from thedebugappledomaincommand; the two commands show related events.
Router# debug apple remapRouter# debug apple domainAT-REMAP: RemapProcess for net 30000 domain AURP Domain 1AT-REMAP: ReshuffleRemapList for subdomain 1AT-REMAP: Could not find a remap for cable 3000-3001AT-DOMAIN: atdomain_DisablePort for Tunnel0AT-DOMAIN: CleanUpDomain for domain 1 [AURP Domain 1]AT-DOMAIN: Disabling interface Ethernet1AT-DOMAIN: atdomain_DisablePort for Ethernet1AT-DOMAIN: CleanUpDomain for domain 1 [AURP Domain 1]AT-DOMAIN: CleanSubDomain for inbound subdomain 1AT-REMAP: Remap for net 70 inbound subdomain 1 has been deletedAT-DOMAIN: DeleteAvRemapList for inbound subdomain 1AT-DOMAIN: DeleteRemapTable for subdomain 1AT-DOMAIN: DeleteAvRemapList for inbound subdomain 1AT-DOMAIN: CleanSubDomain for outbound subdomain 1AT-DOMAIN: DeleteRemapTable for subdomain 1AT-REMAP: RemapProcess for net 30000 domain AURP Domain 1 Remaped Net 10000AT-REMAP: Remap for net 50 outbound subdomain 1 has been deletedAT-DOMAIN: DeleteAvRemapList for outbound subdomain 1AT-DOMAIN: DeleteAvRemapList for outbound subdomain 1AT-DOMAIN: CleanUpDomain for domain 1 [AURP Domain 1]AT-DOMAIN: CleanSubDomain for inbound subdomain 1AT-DOMAIN: DeleteRemapTable for subdomain 1AT-DOMAIN: DeleteAvRemapList for inbound subdomain 1AT-DOMAIN: CleanSubDomain for outbound subdomain 1AT-DOMAIN: DeleteRemapTable for subdomain 1AT-DOMAIN: DeleteAvRemapList for outbound subdomain 1
Related Commands DescriptionCommand
Enables debugging of the AppleTalk domainactivities.
debug apple domain
Cisco IOS Debug Command Reference - Commands A through D 69
debug aaa accounting through debug auto-configdebug apple remap
Cisco IOS Debug Command Reference - Commands A through D70
debug aaa accounting through debug auto-configdebug apple remap
debug apple routingTo enable debugging output from the Routing Table Maintenance Protocol ( RTMP) routines, use thedebugapplerouting command in privileged EXEC mode. To disable debugging output, use the no form ofthis command.
debug apple routing [type number]
no debug apple routing [type number]
Syntax Description (Optional) Interface type.type
(Optional) Interface number.number
Command Modes Privileged EXEC
Usage Guidelines This command can be used to monitor acquisition of routes, aging of routing table entries, and advertisementof known routes. It also reports conflicting network numbers on the same network if the network ismisconfigured.
Because the debugapplerouting command can generate many messages, use it only when router CPUutilization is less than 50 percent.
Caution
Examples The following is sample output from the debugapplerouting command:
Router# debug apple routingAT: src=Ethernet0:4160.41, dst=4160-4160, size=19, 2 rtes, RTMP pkt sentAT: src=Ethernet1:41069.25, dst=41069, size=427, 96 rtes, RTMP pkt sentAT: src=Ethernet2:4161.23, dst=4161-4161, size=427, 96 rtes, RTMP pkt sentAT: Route ager starting (97 routes)AT: Route ager finished (97 routes)AT: RTMP from 4160.19 (new 0,old 94,bad 0,ign 0, dwn 0)AT: RTMP from 4160.250 (new 0,old 0,bad 0,ign 2, dwn 0)AT: RTMP from 4161.236 (new 0,old 94,bad 0,ign 1, dwn 0)AT: src=Ethernet0:4160.41, dst=4160-4160, size=19, 2 rtes, RTMP pkt sentThe table below describes the fields in the first line of sample debugapplerouting output.
Table 10: debug apple routing Field Descriptions--First Line of Output
DescriptionField
Indicates that this is AppleTalk debugging output.AT:
Indicates the source router interface and networkaddress for the RTMP update packet.
src=Ethernet0:4160.41
Cisco IOS Debug Command Reference - Commands A through D 71
debug aaa accounting through debug auto-configdebug apple routing
DescriptionField
Indicates the destination network address for theRTMP update packet.
dst=4160-4160
Displays the size of this RTMP packet (in bytes).size=19
Indicates that this RTMP update packet includesinformation on two routes.
2 rtes
Indicates that this type of message describes an RTMPupdate packet that the router has sent (rather than onethat it has received).
RTMP pkt sent
The following two messages indicate that the ager has started and finished the aging process for the routingtable and that this table contains 97 entries:
AT: Route ager starting (97 routes)AT: Route ager finished (97 routes)The table below describes the fields in the following line of the debugapplerouting command output:
AT: RTMP from 4160.19 (new 0,old 94,bad 0,ign 0, dwn 0)
Table 11: debug apple routing Field Descriptions
DescriptionField
Indicates that this is AppleTalk debugging output.AT:
Indicates the source address of the RTMP update therouter received.
RTMP from 4160.19
Displays the number of routes in this RTMP updatepacket that the router did not already know about.
new 0
Displays the number of routes in this RTMP updatepacket that the router already knew about.
old 94
Displays the number of routes the other routerindicates have gone bad.
bad 0
Displays the number of routes the other router ignores.ign 0
Displays the number of poisoned tuples included inthis packet.
dwn 0
Cisco IOS Debug Command Reference - Commands A through D72
debug aaa accounting through debug auto-configdebug apple routing
debug apple zipTo display debugging output from the Zone Information Protocol (ZIP) routines, use the debugapplezipcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug apple zip [type number]
no debug apple zip [type number]
Syntax Description (Optional) Interface type.type
(Optional) Interface number.number
Command Modes Privileged EXEC
Usage Guidelines This command reports significant events such as the discovery of new zones and zone list queries. It generatesinformation similar to that generated by the debug apple routing command, but generates it for ZIP packetsinstead of Routing Table Maintenance Protocol (RTMP) packets.
You can use the debugapplezip command to determine whether a ZIP storm is taking place in the AppleTalknetwork. You can detect the existence of a ZIP storm when you see that no router on a cable has the zonename corresponding to a network number that all the routers have in their routing tables.
Examples The following is sample output from the debugapplezip command:
Router# debug apple zipAT: Sent GetNetInfo request broadcast on Ether0AT: Recvd ZIP cmd 6 from 4160.19-6AT: 3 query packets sent to neighbor 4160.19AT: 1 zones for 31902, ZIP XReply, src 4160.19AT: net 31902, zonelen 10, name US-FloridaThe first line indicates that the router has received an RTMP update that includes a new network number andis now requesting zone information:
AT: Sent GetNetInfo request broadcast on Ether0The second line indicates that the neighbor at address 4160.19 replies to the zone request with a default zone:
AT: Recvd ZIP cmd 6 from 4160.19-6The third line indicates that the router responds with three queries to the neighbor at network address 4160.19for other zones on the network:
AT: 3 query packets sent to neighbor 4160.19The fourth line indicates that the neighbor at network address 4160.19 responds with a ZIP extended reply,indicating that one zone has been assigned to network 31902:
AT: 1 zones for 31902, ZIP XReply, src 4160.19
Cisco IOS Debug Command Reference - Commands A through D 73
debug aaa accounting through debug auto-configdebug apple zip
The fifth line indicates that the router responds that the zone name of network 31902 is US-Florida, and thezone length of that zone name is 10:
AT: net 31902, zonelen 10, name US-Florida
Cisco IOS Debug Command Reference - Commands A through D74
debug aaa accounting through debug auto-configdebug apple zip
debug appn allTo turn on all possible debugging messages for Advanced Peer-to-Peer Networking (APPN), use thedebugappnall command in privileged EXEC mode. To disable debugging output, use the noform of thiscommand.
debug appn all
no debug appn all
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines This command shows all APPN events. Use other forms of the debugappn command to display specific typesof events.
Because the debugappnallcommand can generate many messages and alter timing in the network node,use it only when instructed by authorized support personnel.
Caution
Debugging output takes priority over other network traffic. The debugappnall command generates moreoutput than any other debugappn command and can alter timing in the network node. This command canseverely diminish router performance or even render it unusable. In virtually all cases, it is best to usespecific debugappn commands.
Caution
Examples Refer to the documentation for specific debugappn commands for examples and explanations.
Related Commands
Refer to the other forms of the debugappn command to enable specific debug output selectively.Note
DescriptionCommand
Displays the APPN CS component activity.debug appn cs
Displays debugging information on APPN DScomponent activity.
debug appn ds
Displays information related to HPR code execution.debug appn hpr
Cisco IOS Debug Command Reference - Commands A through D 75
debug aaa accounting through debug auto-configdebug appn all
DescriptionCommand
Displays debugging information on APPN MScomponent activity.
debug appn ms
Displays information on APPN NOF componentactivity.
debug appn nof
Displays debugging information on APPN PCcomponent activity.
debug appn pc
Displays debugging information on APPN PScomponent activity.
debug appn ps
Displays debugging information on APPN SCMcomponent activity.
debug appn scm
Displays SS events.debug appn ss
Displays debugging information on APPN TRScomponent activity.
debug appn ss
Cisco IOS Debug Command Reference - Commands A through D76
debug aaa accounting through debug auto-configdebug appn all
debug appn csTo display Advanced Peer-to-Peer Networking (APPN) Configuration Services (CS) component activity, usethe debugappncs command in privileged EXEC mode. To disable debugging output, use the no form of thiscommand.
debug appn cs
no debug appn cs
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines The CS component is responsible for defining link stations, ports, and connection networks. It is responsiblefor the activation and deactivation of ports and link stations and handles status queries for these resources.
Examples The following is sample output from the debugappncs command. In this example a link station is beingstopped.
Router# debug appn csTurned on event 008000FFRouter# appn stop link PATTYAPPN: ----- CS ----- Deq STOP_LS messageAPPN: ----- CS ----- FSM LS: 75 17 5 8APPN: ----- CS ----- Sending DEACTIVATE_AS - station PATTYAPPN: ----- CS ----- deactivate_as_p->ips_header.lpid = A80A60APPN: ----- CS ----- deactivate_as_p->ips_header.lpid = A80A60APPN: ----- CS ----- Sending DESTROY_TG to PC - station PATTY - lpid=A80A60APPN: ----- CS ----- Deq DESTROY_TG - station PATTYAPPN: ----- CS ----- FSM LS: 22 27 8 0APPN: ----- CS ----- Sending TG update for LS PATTY to TRSAPPN: ----- CS ----- ENTERING XID_PROCESSING: 4%APPN-6-APPNSENDMSG: Link Station PATTY stoppedThe table below describes the significant fields and messages shown in the display.
Table 12: debug appn cs Field Descriptions
DescriptionField
APPN debugging output.APPN
CS component output.CS
CS received a message from another component.Deq
Link station finite state machine is being referenced.FSM LS
CS is sending a message to another component.Sending
Cisco IOS Debug Command Reference - Commands A through D 77
debug aaa accounting through debug auto-configdebug appn cs
Related Commands DescriptionCommand
Turns on all possible debugging messages for APPN.debug appn all
Cisco IOS Debug Command Reference - Commands A through D78
debug aaa accounting through debug auto-configdebug appn cs
debug appn dsTo display debugging information on Advanced Peer-to-Peer Networking (APPN) Directory Services (DS)component activity, use the debugappnds command in privileged EXECmode. To disable debugging output,use the no form of this command.
debug appn ds
no debug appn ds
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines TheDS component manages searches for resources in the APPN network. DS is also responsible for registrationof resources within the network.
Examples The following is sample output from the debugappnds command. In this example a search has been received.
Router# debug appn dsTurned on event 080000FFAPPN: NEWDS: LS: search from: NETA.PATTYAPPN: NEWDS: pcid: DD3321E8B5667111APPN: NEWDS: Invoking FSM NNSoluAPPN: NEWDS: LSfsm_NNSolu: 00A67AA0 pcid: DD3321E8B5667111 row: 0 col: 0 inp: 80200000APPN: NEWDS: LSfsm_parent: 00A89940 row: 0 col: 0 inp: 80000000APPN: NEWDS: Rcvd a LMRQAPPN: NEWDS: LSfsm_NNSolu: 00A67AA0 pcid: DD3321E8B5667111 row: 12 col: 1 inp: 40000000APPN: NEWDS: LSfsm_parent: 00A89940 row: 8 col: 1 inp: 40000000APPN: NEWDS: LSfsm_child: 00A89BE8 row: 0 col: 0 inp: 80000080APPN: NEWDS: PQenq REQUEST_ROUTE(RQ) to TRSAPPN: NEWDS: LSfsm_child: 00A8A1C0 row: 1 col: 0 inp: 80000008APPN: NEWDS: LSfsm_NNSolu: 00A67AA0 pcid: DD3321E8B5667111 row: 5 col: 1 inp: 80C04000APPN: NEWDS: LSfsm_child: 00A8A1C0 row: 7 col: 1 inp: 80844008APPN: NEWDS: Rcvd a LMRYAPPN: NEWDS: LSfsm_NNSolu: 00A67AA0 pcid: DD3321E8B5667111 row: 16 col: 6 inp: 40800000APPN: NEWDS: LSfsm_child: 00A8A1C0 row: 14 col: 5 inp: 40800000APPN: NEWDS: LSfsm_parent: 00A89940 row: 3 col: 1 inp: 80840000APPN: NEWDS: send locate to node: NETA.PATTYThe table below describes the significant fields shown in the display.
Table 13: debug appn ds Field Descriptions
DescriptionField
APPN debugging output.APPN
DS component output.NEWDS
Locate was received from NETA.PATTY.search from
Locate Search finite statemachine is being referenced.LSfsm_
Cisco IOS Debug Command Reference - Commands A through D 79
debug aaa accounting through debug auto-configdebug appn ds
DescriptionField
Message was sent to another component.PQenq
Message was received from another component.Rcvd
Locate will be sent to NETA.PATTY.send locate
Related Commands DescriptionCommand
Turns on all possible debugging messages for APPN.debug appn all
Cisco IOS Debug Command Reference - Commands A through D80
debug aaa accounting through debug auto-configdebug appn ds
debug appn hprTo display debugging information related to High Performance Routing (HPR) code execution, use thedebugappnhprcommand in privileged EXEC mode. To disable debugging output, use the no form of thiscommand.
debug appn hpr
no debug appn hpr
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Examples The following is sample output from the debugappnhpr command:
Router# debug appn hprAPPN: -- ncl.ncl_map_dlc_type() -- mapping TOKEN_RING(4) to NCL_TR(3)APPN: -- ncl.ncl_port() -- called with port_type:3, cisco_idb:893A14, hpr_ssap:C8APPN: -- ncl.process_port_change() -- port coming upAPPN: -- ncl.process_port_change() -- PORT_UPAPPN: -- ncl.ncl_port_fsm -- FSM Invoked: Input:0, State:0->1, Action:0APPN: -- ncl.ncl_port_fsm -- FSM Invoked: Input:1, State:1->2, Action:1APPN: -- ncl.ncl_unmap_dlc_type() -- mapping NCL(3) to CLS(3)APPN: ----- ANR ----- Sending ACTIVATE_SAP.reqAPPN: -- cswncsnd.main() -- received LSA_IPS ips.APPN: -- ncl.ncl_port_fsm -- FSM Invoked: Input:3, State:2->3, Action:4APPN: -- ncl.ncl_assign_anr() -- Assigned ANR,anr:8002APPN: -- ncl.ncl_map_dlc_type() -- mapping TOKEN_RING(4) to NCL_TR(3)APPN: -- ncl.ncl_populate_anr() -- anr:8002, dlc_type:3, idb 893A14APPN: -- ncl.ncl_populate_anr() -- send anr_tbl_update to owning cswncsndAPPN: -- ncl.ncl_ls_fsm -- FSM Invoked: Input:0, State:0->1, Action:0APPN: ncl.ncl_send_reqopn_stn_reqAPPN: -- ncl.ncl_unmap_dlc_type() -- mapping NCL(3) to CLS(3)APPN: -- ncl.ncl_ls_fsm() -- send anr_tbl_update to owning cswncsndAPPN: -- cswncsnd.main() -- received ANR_TBL_UPDATE ips.APPN: -- cswncsnd.apply_anr_table_update() -- ANR:8002APPN: -- cswncsnd.main() -- received ANR_TBL_UPDATE ips.APPN: -- cswncsnd.apply_anr_table_update() -- ANR:8002APPN: -- cswncsnd.main() -- received LSA_IPS ips.APPN: -- ncl.ncl_ls_fsm -- FSM Invoked: Input:1, State:1->2, Action:1APPN: -- ncl.ncl_ls_fsm -- P_CEP_ID:AAF638APPN: -- ncl.ncl_ls_fsm() -- send anr_tbl_update to owning cswncsndAPPN: -- cswncsnd.main() -- received ANR_TBL_UPDATE ips.APPN: -- cswncsnd.apply_anr_table_update() -- ANR:8002APPN: rtpm: rtp_send() sent data over connection B9D5E8APPN: hpr timer: rtt start time clocked at 135952 msAPPN: -- cswncsnd.main() -- received NCL_SND_MSG ips.APPN: -- cswncsnd.process_nlp_from_rtp() -- label: 8002, send to p_cep 00AAF638.APPN: hpr timer: rtt end time clocked at 135972 msAPPN: hpr timer: round trip time measured at 20 msThe table below describes the significant fields shown in the display.
Table 14: debug appn hpr Field Descriptions
DescriptionField
APPN debugging output.APPN
Cisco IOS Debug Command Reference - Commands A through D 81
debug aaa accounting through debug auto-configdebug appn hpr
DescriptionField
Network control layer debugging output. Networkcontrol layer is the component that handles ANRpackets.
NCL
Network control layer port finite state machine hasbeen invoked.
ncl_port_fsm
ANR label has been assigned to an activating linkstation.
ncl_assign_anr
System is updating the ANR record with informationspecific to the link station.
ncl_populate_anr
Network control layer link finite state machine hasbeen invoked.
ncl_ls_fsm
RTP is about to send a packet.rtp_send
Debugging output related to an HPR timer.hpr timer
RTP is measuring the round-trip time for an HPRstatus request packet. This is the start time.
rtt start time
Network control layer has been requested to send apacket.
NCL_SND_MSG
Network control layer has been requested by RTP tosend a packet.
process_nlp_from_rtp
RTP is measuring the round-trip time for an HPRstatus request packet. This is the time.
rtt end time
Round-trip time for this HPR status exchange hasbeen computed.
round trip time
Related Commands DescriptionCommand
Turns on all possible debugging messages for APPN.debug appn all
Cisco IOS Debug Command Reference - Commands A through D82
debug aaa accounting through debug auto-configdebug appn hpr
debug appn msTo display debugging information on Advanced Peer-to-Peer Networking (APPN) Management Services(MS) component activity, use the debugappnms command in privileged EXEC mode. To disable debuggingoutput, use the no form of this command.
debug appn ms
no debug appn ms
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines The MS component is responsible for generating, sending, and forwarding network management informationin the form of traps and alerts to a network management focal point, such as Netview, in the APPN network.
Examples The following is sample output from the debugappnms command. In this example an error occurred thatcaused an alert to be generated.
Router# debug appn msAPPN: ----- MSS00 ---- Deq ALERT_MSU msgAPPN: --- MSP70 --- ALERT MV FROM APPN WITH VALID LGTHAPPN: --- MSCPL --- Find Active FPAPPN: --- MSP30 --- Entering Build MS TransportAPPN: --- MSP31 --- Entering Building Routing Info.APPN: --- MSP34 --- Entering Build GDSAPPN: --- MSP32 --- Entering Building UOW correlatorAPPN: --- MSP34 --- Entering Build GDSAPPN: --- MSP30 --- Building GDS 0x1310APPN: --- MSP30 --- Building MS TransportAPPN: --- MSP72 --- ACTIVE FP NOT FOUND, SAVE ONLYAPPN: --- MSUTL --- UOW <= 60, ALL COPIED in extract_uowAPPN: --- MSCAT --- by enq_cached_ms QUEUE SIZE OF QUEUE after enq 4The table below describes the significant fields shown in the display.
Table 15: debug appn ms Field Descriptions
DescriptionField
Indicates that this is APPN debugging output.APPN
Indicates that this is MS component output.MSP
Related Commands DescriptionCommand
Turns on all possible debugging messages for APPN.debug appn all
Cisco IOS Debug Command Reference - Commands A through D 83
debug aaa accounting through debug auto-configdebug appn ms
Cisco IOS Debug Command Reference - Commands A through D84
debug aaa accounting through debug auto-configdebug appn ms
debug appn nofTo display debugging information on Advanced Peer-to-Peer Networking (APPN) Node Operator Facility(NOF) component activity, use thedebugappnnofcommand in privileged EXECmode. To disable debuggingoutput, use the no form of this command.
debug appn nof
no debug appn nof
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines The NOF component is responsible for processing commands entered by the user such as start, stop, show,and configuration commands. NOF forwards these commands to the proper component and waits for theresponse.
Examples The following is sample output from the debugappnnof command. In this example, an APPN connectionnetwork is being defined.
Router# debug appn nofTurned on event 010000FFRouter# config termEnter configuration commands, one per line. End with CNTL/Z.Router(config)# appn connection-network NETA.CISCORouter(config-appn-cn)# port TR0Router(config-appn-cn)# completerouter(config)#APPN: ----- NOF ----- Define Connection Network Verb ReceivedAPPN: ----- NOF ----- send define_cn_t ips to csAPPN: ----- NOF ----- waiting for define_cn rsp from csrouter(config)#The table below describes the significant fields shown in the display.
Table 16: debug appn nof Field Descriptions
DescriptionField
APPN debugging output.APPN
NOF component output.NOF
Configuration command was entered.Received
Message was sent to CS.send
Response was expected from CS.waiting
Cisco IOS Debug Command Reference - Commands A through D 85
debug aaa accounting through debug auto-configdebug appn nof
Related Commands DescriptionCommand
Turns on all possible debugging messages for APPN.debug appn all
Cisco IOS Debug Command Reference - Commands A through D86
debug aaa accounting through debug auto-configdebug appn nof
debug appn pcTo display debugging information onAdvanced Peer-to-Peer Networking (APPN) Path Control (PC) componentactivity, use thedebugappnpccommand in privileged EXEC mode. To disable debugging output, use the noform of this command.
debug appn pc
no debug appn pc
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines The PC component is responsible for passing Message Units (MUs) between the Data Link Control (DLC)layer and other APPN components. PC implements transmission priority by passing higher priority MUs tothe DLC before lower priority MUs.
Examples The following is sample output from the debugappnpc command. In this example an MU is received fromthe network.
Router# debug appn pcTurned on event 040000FFAPPN: ----- PC-----PC Deq REMOTE msg variant_name 2251APPN: --PC-- mu received to PC lpid: A80AECAPPN: --PC-- mu received from p_cep_id: 67C6F8APPN: ----- PC-----PC Deq LSA_IPS from DLCAPPN: --PCX dequeued a DATA.INDAPPN: --- PC processing DL_DATA.indAPPN: --PC-- mu_error_checker with no error, calling frrAPPN: --PC-- calling frr for packet received on LFSID: 1 2 3APPN: ----- PC-----PC is sending MU to SC A90396APPN: ----- SC-----send mu: A90396, rpc: 0, nws: 7, rh.b1: 90APPN: SC: Send mu.snf: 8, th.b0: 2E, rh.b1: 90, dcf: 8The table below describes the significant fields shown in the display.
Table 17: debug appn pc Field Descriptions
DescriptionField
APPN debugging output.APPN
PC component output.PC
Message was received from the network.Deq REMOTE
Message is an MU.mu received
MU contains data.DATA.IND
Cisco IOS Debug Command Reference - Commands A through D 87
debug aaa accounting through debug auto-configdebug appn pc
DescriptionField
MU is session traffic for an ISR session. The MU isforwarded to the Session Connector component forrouting.
sending MU
Related Commands DescriptionCommand
Turns on all possible debugging messages for APPN.debug appn all
Cisco IOS Debug Command Reference - Commands A through D88
debug aaa accounting through debug auto-configdebug appn pc
debug appn psTo display debugging information on Advanced Peer-to-Peer Networking (APPN) Presentation Services (PS)component activity, use the debugappnpscommand in privileged EXECmode. To disable debugging output,use the no form of this command.
debug appn ps
no debug appn ps
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines The PS component is responsible for managing the Transaction Programs (TPs) used by APPN. TPs are usedfor sending and receiving searches, receiving resource registration, and sending and receiving topology updates.
Examples The following is sample output from the debugappnps command. In this example a CP capabilities exchangeis in progress.
Router# debug appn psTurned on event 200000FFAPPN: ---- CCA --- CP_CAPABILITIES_TP has startedAPPN: ---- CCA --- About to wait for Partner to send CP_CAPAPPN: ---- CCA --- Partner LU name: NETA.PATTYAPPN: ---- CCA --- Mode Name: CPSVCMGAPPN: ---- CCA --- CGID: 78APPN: ---- CCA --- About to send cp_cp_session_act to SSAPPN: ---- CCA --- Waiting for cp_cp_session_act_rsp from SSAPPN: ---- CCA --- Received cp_cp_session_act_rsp from SSAPPN: ---- CCA --- About to send CP_CAP to partnerAPPN: ---- CCA --- Send to partner completed with rc=0, 0APPN: ---- RCA --- Allocating conversationAPPN: ---- RCA --- Sending CP_CAPABILITIESAPPN: ---- RCA --- Getting conversation attributesAPPN: ---- RCA --- Waiting for partner to send CP_CAPABILITIESAPPN: ---- RCA --- Normal processing complete with cgid = 82APPN: ---- RCA --- Deallocating CP_Capabilities conversationThe table below describes the significant fields shown in the display.
Table 18: debug appn ps Field Descriptions
DescriptionField
APPN debugging output.APPN
CP Capabilities TP output.CCA
Receive CP Capabilities TP output.RCA
Cisco IOS Debug Command Reference - Commands A through D 89
debug aaa accounting through debug auto-configdebug appn ps
Related Commands DescriptionCommand
Turns on all possible debugging messages for APPN.debug appn all
Cisco IOS Debug Command Reference - Commands A through D90
debug aaa accounting through debug auto-configdebug appn ps
debug appn scmTo display debugging information on Advanced Peer-to-Peer Networking (APPN) Session ConnectorManager(SCM) component activity, use thedebugappnscmcommand in privileged EXECmode. To disable debuggingoutput, use the no form of this command.
debug appn scm
no debug appn scm
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines The SCM component is responsible for the activation and deactivation of the local resources that route anintermediate session through the router.
Examples The following is sample output from the debugappnscm command. In this example an intermediate sessiontraffic is being routed.
Router# debug appn scmTurned on event 020000FFRouter#APPN: ----- SCM-----SCM Deq a MUAPPN: ----- SCM-----SCM send ISR_INIT to SSIAPPN: ----- SCM-----(i05) Enter compare_fqpcid()APPN: ----- SCM-----Adding new session_info table entry. addr=A93160APPN: ----- SCM-----SCM Deq ISR_CINIT messageAPPN: ----- SCM-----(i05) Enter compare_fqpcid()APPN: ----- SCM-----SCM sends ASSIGN_LFSID to ASMAPPN: ----- SCM-----SCM Rcvd sync ASSIGN_LFSID from ASMAPPN: ----- SCM-----SCM PQenq a MU to ASMAPPN: ----- SCM-----SCM Deq a MUAPPN: ----- SCM-----(i05) Enter compare_fqpcid()APPN: ----- SCM-----SCM PQenq BIND rsp to ASMThe table below describes the significant fields shown in the display.
Table 19: debug appn scm Field Descriptions
DescriptionField
APPN debugging output.APPN
SCM component output.SCM
Related Commands DescriptionCommand
Turns on all possible debugging messages for APPN.debug appn all
Cisco IOS Debug Command Reference - Commands A through D 91
debug aaa accounting through debug auto-configdebug appn scm
Cisco IOS Debug Command Reference - Commands A through D92
debug aaa accounting through debug auto-configdebug appn scm
debug appn ssTo display session services (SS) events, use thedebugappnsscommand in privileged EXECmode. To disabledebugging output, use the no form of this command.
debug appn ss
no debug appn ss
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines The SS component generates unique session identifiers, activates and deactivates control point-to-controlpoint (CP-CP) sessions, and assists logical units (LUs) in initiating and activating LU-LU sessions.
Examples The following is sample output from the debugappnss command. In this example CP-CP sessions betweenthe router and another node are being activated.
Router# debug appn ssTurned on event 100000FFAPPN: ----- SS ----- Deq ADJACENT_CP_CONTACTED messageAPPN: ----- SS ----- Deq SESSST_SIGNAL messageAPPN: ----- SS ----- Deq CP_CP_SESSION_ACT messageAPPN: Sending ADJACENT_NN_1015 to SCM, adj_node_p=A6B980,cp_name=NETA.PATTYAPPN: ----- SS ----- Sending REQUEST_LAST_FRSN message to TRSAPPN: ----- SS ----- Receiving REQUEST_LAST_FRSN_RSP from TRSAPPN: ----- SS ----- Sending ACTIVE CP_STATUS CONLOSER message to DSAPPN: ----- SS ----- Sending ACTIVE CP_STATUS CONLOSER message to MSAPPN: ----- SS ----- Sending ACTIVE CP_STATUS CONLOSER message to TRSAPPN: ----- SS ----- Sending CP_CP_SESSION_ACT_RSP message to CCA TPAPPN: ----- SS ----- Sending PENDING_ACTIVE CP_STATUS CONWINNER message to DSAPPN: ----- SS ----- Sending REQUEST_LAST_FRSN message to TRSAPPN: ----- SS ----- Receiving REQUEST_LAST_FRSN_RSP from TRSAPPN: ----- SS ----- Sending ACT_CP_CP_SESSION message to RCA TPAPPN: ----- SS ----- Deq ASSIGN_PCID messageAPPN: ----- SS ----- Sending ASSIGN_PCID_RSP message to someoneAPPN: ----- SS ----- Deq INIT_SIGNAL messageAPPN: ----- SS ----- Sending REQUEST_COS_TPF_VECTOR message to TRSAPPN: ----- SS ----- Receiving an REQUEST_COS_TPF_VECTOR_RSP from TRSAPPN: ----- SS ----- Sending REQUEST_SINGLE_HOP_ROUTE message to TRSAPPN: ----- SS ----- Receiving an REQUEST_SINGLE_HOP_ROUTE_RSP from TRSAPPN: ----- SS ----- Sending ACTIVATE_ROUTE message to CSAPPN: ----- SS ----- Deq ACTIVATE_ROUTE_RSP messageAPPN: ----- SS ----- Sending CINIT_SIGNAL message to SMAPPN: ----- SS ----- Deq ACT_CP_CP_SESSION_RSP messageAPPN: -- SS----SS ssp00, act_cp_cp_session_rsp received, sense_code=0, cgid=5C, ips@=A93790APPN: Sending ADJACENT_NN_1015 to SCM, adj_node_p=A6B980,cp_name=18sAPPN: ----- SS ----- Sending ACTIVE CP_STATUS CONWINNER message to DSAPPN: ----- SS ----- Sending ACTIVE CP_STATUS CONWINNER message to MSAPPN: ----- SS ----- Sending ACTIVE CP_STATUS CONWINNER message to TRSThe table below describes the significant fields shown in the display.
Cisco IOS Debug Command Reference - Commands A through D 93
debug aaa accounting through debug auto-configdebug appn ss
Table 20: debug appn ss Field Descriptions
DescriptionField
APPN debugging output.APPN
SS component output.SS
Related Commands DescriptionCommand
Turns on all possible debugging messages for APPN.debug appn all
Cisco IOS Debug Command Reference - Commands A through D94
debug aaa accounting through debug auto-configdebug appn ss
debug appn trsTo display debugging information on Advanced Peer-to-Peer Networking (APPN) Topology and RoutingServices (TRS) component activity, use thedebugappntrs command in privileged EXEC mode. To disabledebugging output, use the no form of this command.
debug appn trs
no debug appn trs
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines The TRS component is responsible for creating andmaintaining the topology database, creating andmaintainingthe class of service database, and computing and caching optimal routes through the network.
Examples The following is sample output from the debugappntrs command:
Router# debug appn trsTurned on event 400000FFAPPN: ----- TRS ----- Received a QUERY_CPNAMEAPPN: ----- TRS ----- Received a REQUEST_ROUTEAPPN: ----- TRS ----- check_node node_name=NETA.LISAAPPN: ----- TRS ----- check_node node_index=0APPN: ----- TRS ----- check_node node_weight=60APPN: ----- TRS ----- add index 484 to origin description listAPPN: ----- TRS ----- add index 0 to dest description listAPPN: ----- TRS ----- origin tg_vector is NULLAPPN: ----- TRS ----- weight_to_origin = 0APPN: ----- TRS ----- weight_to_dest = 0APPN: ----- TRS ----- u_b_s_f weight = 30APPN: ----- TRS ----- u_b_s_f prev_weight = 2147483647APPN: ----- TRS ----- u_b_s_f origin_index = 484APPN: ----- TRS ----- u_b_s_f dest_index = 0APPN: ----- TRS ----- b_r_s_f weight = 30APPN: ----- TRS ----- b_r_s_f origin_index = 484APPN: ----- TRS ----- b_r_s_f dest_index = 0APPN: ----- TRS ----- Received a REQUEST_ROUTEAPPN: ----- TRS ----- check_node node_name=NETA.LISAAPPN: ----- TRS ----- check_node node_index=0APPN: ----- TRS ----- check_node node_weight=60APPN: ----- TRS ----- check_node node_name=NETA.BARTAPPN: ----- TRS ----- check_node node_index=484APPN: ----- TRS ----- check_node node_weight=60APPN: ----- TRS ----- add index 484 to origin description listAPPN: ----- TRS ----- add index 0 to dest description listAPPN: ----- TRS ----- origin_tg_weight to non-VN=30APPN: ----- TRS ----- origin_node_weight to non-VN=60APPN: ----- TRS ----- weight_to_origin = 90APPN: ----- TRS ----- weight_to_dest = 0APPN: ----- TRS ----- u_b_s_f weight = 120APPN: ----- TRS ----- u_b_s_f prev_weight = 2147483647APPN: ----- TRS ----- u_b_s_f origin_index = 484APPN: ----- TRS ----- u_b_s_f dest_index = 0APPN: ----- TRS ----- b_r_s_f weight = 120APPN: ----- TRS ----- b_r_s_f origin_index = 484APPN: ----- TRS ----- b_r_s_f dest_index = 0
Cisco IOS Debug Command Reference - Commands A through D 95
debug aaa accounting through debug auto-configdebug appn trs
The table below describes the significant fields shown in the display.
Table 21: debug appn trs Field Descriptions
DescriptionField
APPN debugging output.APPN
TRS component output.TRS
Cisco IOS Debug Command Reference - Commands A through D96
debug aaa accounting through debug auto-configdebug appn trs
debug arapTo display AppleTalk Remote Access Protocol (ARAP) events, use the debugarap command in privilegedEXEC mode. To disable debugging output, use the noform of this command.
debug arap {internal| memory| mnp4| v42bis} [linenum [aux| console| tty| vty]]
no debug arap {internal| memory| mnp4| v42bis} [linenum [aux| console| tty| vty]]
Syntax Description Debugs internal ARA packets.internal
Debugs memory allocation for ARA.memory
Debugs low-level asynchronous serial protocol.mnp4
Debugs V.42bis compression.v42bis
(Optional) Line number. The number ranges from 0to 999, depending on what type of line is selected.
linenum
(Optional) Auxiliary line.aux
(Optional) Primary terminal line.console
(Optional) Physical terminal asynchronous line.tty
(Optional) Virtual terminal line.vty
Command Modes Privileged EXEC
Usage Guidelines Use the debugarap commandwith the debugcallback command on access servers to debug dialin and callbackevents.
Use the debugmodem command to help catch problems related to ARAP autodetection (that is,autoselectarap). These problems are very common and are most often caused by modems, which are themost common cause of failure in ARAP connection and configuration sessions.
Examples The following is sample output from the debugarapinternal command:
Router# debug arap internal
ARAP: ---------- SRVRVERSION ----------ARAP: ---------- ACKing 0 ----------ARAP: ---------- AUTH_CHALLENGE ----------arapsec_local_account setting up callbackARAP: ---------- ACKing 1 ----------ARAP: ---------- AUTH_RESPONSE ----------
Cisco IOS Debug Command Reference - Commands A through D 97
debug aaa accounting through debug auto-configdebug arap
arap_startup initiating callback ARAP 2.0ARAP: ---------- CALLBACK ----------TTY7 Callback process initiated, user: dialback dialstring 40TTY7 Callback forced wait = 4 secondsTTY7 ARAP Callback Successful - await exec/autoselect pickupTTY7: Callback in effectARAP: ---------- STARTINFOFROMSERVER ----------ARAP: ---------- ACKing 0 ----------ARAP: ---------- ZONELISTINFO ----------ARAP: ---------- ZONELISTINFO ----------ARAP: ---------- ZONELISTINFO ----------ARAP: ---------- ZONELISTINFO ----------ARAP: ---------- ZONELISTINFO ----------
Related Commands DescriptionCommand
Displays callback events when the router is using amodem and a chat script to call back on a terminalline.
debug callback
Observes modem line activity on an access server.debug modem
Cisco IOS Debug Command Reference - Commands A through D98
debug aaa accounting through debug auto-configdebug arap
debug archive config timestampTo enable debugging of the processing time for each integral step of a configuration replace operation andthe size of the configuration files being handled, use the debug archive config timestamp command inprivileged EXEC mode. To disable debugging output, use the no form of this command.
debug archive config timestamp
no debug archive config timestamp
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.3(7)T
This command was integrated into Cisco IOS Release 12.2(25)S.12.2(25)S
This command was integrated into Cisco IOS Release 12.2(28)SB.12.2(28)SB
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
This command was implemented on the Cisco 10000 series.12.2(31)SB2
This command was integrated into Cisco IOS Release 12.2(33)SXH.12.2(33)SXH
This command was integrated into Cisco IOS Release 12.2(33)SB andimplemented on the Cisco 10000 series.
12.2(33)SB
This command was integrated into Cisco IOS XE Release 3.9S.Cisco IOS XE Release 3.9S
Examples The following is sample output from the debug archive config timestamp command:
Device# debug archive config timestampDevice# configure replace disk0:myconfig forceTiming Debug Statistics for IOS Config Replace operation:
Time to read file slot0:sample_2.cfg = 0 msec (0 sec)Number of lines read:55Size of file :1054
Starting Pass 1Time to read file system:running-config = 0 msec (0 sec)Number of lines read:93Size of file :2539Time taken for positive rollback pass = 320 msec (0 sec)Time taken for negative rollback pass = 0 msec (0 sec)Time taken for negative incremental diffs pass = 59 msec (0 sec)Time taken by PI to apply changes = 0 msec (0 sec)Time taken for Pass 1 = 380 msec (0 sec)
Cisco IOS Debug Command Reference - Commands A through D 99
debug aaa accounting through debug auto-configdebug archive config timestamp
Starting Pass 2Time to read file system:running-config = 0 msec (0 sec)Number of lines read:55Size of file :1054Time taken for positive rollback pass = 0 msec (0 sec)Time taken for negative rollback pass = 0 msec (0 sec)Time taken for Pass 2 = 0 msec (0 sec)
Total number of passes:1Rollback Done
Related Commands DescriptionCommand
Enables debugging of the Cisco configuration archiveactivities.
debug archive versioning
Cisco IOS Debug Command Reference - Commands A through D100
debug aaa accounting through debug auto-configdebug archive config timestamp
debug archive log config persistentTo turn on debugging of configuration logging persistent events and display the results, use thedebugarchivelogconfigpersistentcommand in privileged EXECmode. To disable the debugging and displayof the archive events, use the no form of this command.
debug archive log config persistent
no debug archive log config persistent
Syntax Description This command has no arguments or keywords.
Command Default If this command is not entered, there is no debugging or display of the configuration logging persistent eventsin the archive.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SRA
This command was integrated into Cisco IOS Release 12.4(11)T.12.4(11)T
This command was integrated into Cisco IOS Release 12.2(33)SXH.12.2(33)SXH
This command is supported in the Cisco IOS Release 12.2SX train. Supportin a specific 12.2SX release of this train depends on your feature set,platform, and platform hardware.
12.2SX
This command was integrated into Cisco IOS Release 12.2(33)SB.12.2(33)SB
Usage Guidelines The configuration logger feature must be enabled in order for the debug capability to work.
Examples The following example turns on the debugging feature and displays the configuration logging persistent events:
Router# debug archive config log persistentRouter# archive log config persistent saveConfiguration logging persistent save triggered.Saving the config log to disk0:IOS-Config-Logger-database’.Command ‘interface eth0’ savedCommand ‘ip address 10.1.1.1 255.255.255.0’ savedCommand ‘no shut’ savedRouter#
Cisco IOS Debug Command Reference - Commands A through D 101
debug aaa accounting through debug auto-configdebug archive log config persistent
Related Commands DescriptionCommand
Saves the persisted commands in the configurationlog to the Cisco IOS secure file system.
archive log config persistent save
Cisco IOS Debug Command Reference - Commands A through D102
debug aaa accounting through debug auto-configdebug archive log config persistent
debug archive versioningTo enable debugging of the Cisco configuration archive activities, use the debug archive versioning commandin privileged EXEC mode. To disable debugging output, use the no form of this command.
debug archive versioning
no debug archive versioning
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.3(7)T
This command was integrated into Cisco IOS Release 12.2(25)S.12.2(25)S
This command was integrated into Cisco IOS Release 12.2(28)SB.12.2(28)SB
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
This command was implemented on the Cisco 10000 series.12.2(31)SB2
This command was integrated into Cisco IOS Release 12.2(33)SXH.12.2(33)SXH
This command is supported in the Cisco IOS Release 12.2SX train. Supportin a specific 12.2SX release of this train depends on your feature set,platform, and platform hardware.
12.2SX
This command was integrated into Cisco IOS Release 12.2(33)SB andimplemented on the Cisco 10000 series.
12.2(33)SB
This command was modified. It was integrated into Cisco IOS Release12.2(33)SRE.
12.2(33)SRE
This command was integrated into Cisco IOS XE Release 3.9S.Cisco IOS XE Release 3.9S
Examples The following is sample output from the debug archive versioning command:
Device# debug archive versioningJan 9 06:46:28.419:backup_running_configJan 9 06:46:28.419:Current = 7Jan 9 06:46:28.443:Writing backup file disk0:myconfig-7Jan 9 06:46:29.547: backup worked
Cisco IOS Debug Command Reference - Commands A through D 103
debug aaa accounting through debug auto-configdebug archive versioning
Related Commands DescriptionCommand
Enables debugging of the processing time for eachintegral step of a configuration replace operation andthe size of the configuration files being handled.
debug archive config timestamp
Cisco IOS Debug Command Reference - Commands A through D104
debug aaa accounting through debug auto-configdebug archive versioning
debug arpTo enable debugging output for Address Resolution Protocol (ARP) transactions, use the debug arp commandin privileged EXEC mode. To disable debugging, use the no form of this command.
debug arp [vrf vrf-name| global] [arp-entry-event| arp-table-event| ha| interface-interaction]
no debug arp [vrf vrf-name| global] [arp-entry-event| arp-table-event| ha| interface-interaction]
Syntax Description (Optional) Enables debug trace for a specific VPNrouting and forwarding (VRF) instance.
vrf vrf-name
(Optional) Enables global VRF debugging.global
(Optional) ARP entry events for which a debug traceis enabled. Keywords are as follows:
• dynamic—Enables debugging output fordynamic ARP entry events.
• interface—Enables debugging output forinterface ARP entry events.
• static—Enables debugging output for staticARP entry events.
• subblocking—Enables debugging output forARP subblocking events.
arp-entry-event
(Optional) ARP entry events for which a debug traceis enabled. Keywords are as follows:
• database—Enables debugging output for ARPdatabase operations.
• table—Enables debugging output for ARP tableoperations.
• timer—Enables debugging output for ARPtimer operations.
arp-table-event
(Optional) Enables debug trace for ARP highavailability (HA) events.
This keyword is available only onHA-capable platforms (that is, Cisconetworking devices that support dual RouteProcessors [RPs]).
Note
ha
Cisco IOS Debug Command Reference - Commands A through D 105
debug aaa accounting through debug auto-configdebug arp
(Optional) ARP interface interaction for which adebug trace is enabled. Keywords are as follows:
• adjacency—Enables debugging output for ARPinterface events and Cisco Express Forwardingadjacency interface events.
• application—Enables debugging output forARP application interface events.
interface-interaction
Command Default Debugging output is disabled for ARP transactions. To enable ARP packet debugging, use this commandwithout a keyword.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.10.3
The following keywords were added: adjacency, application, dynamic, ha,interface, static, subblocking, table, and timer.
12.4(11)T
This command was modified. The database keyword was added.12.2(33)SRE
This command was modified. The vrf vrf-name keyword-argument pair andglobal keyword were added.
15.1(1)SY
Usage Guidelines The debugging information shows whether the device is sending ARP packets and receiving ARP packets.Use this command when only some nodes on a TCP/IP network are responding.
The amount of debug information displayed is filtered based on an interface, an access list, or both, as specifiedby the debug list command.
To list the debugging options enabled on this device, use the show debugging command.
Examples The following example shows how to enable ARP packet debugging filtered on ARP table entries for the hostat 192.0.2.10:
Device(config)# access-list 10 permit host 192.0.2.10Device(config)# exitDevice# debug list 10Device# debug arp
ARP packet debugging is onfor access list: 10
Cisco IOS Debug Command Reference - Commands A through D106
debug aaa accounting through debug auto-configdebug arp
The following is sample output from the debug arp command:
IP ARP: sent req src 192.0.2.7 0000.0c01.e117, dst 192.0.2.96 0000.0000.0000IP ARP: rcvd rep src 192.0.2.96 0800.2010.b908, dst 192.0.2.7IP ARP: rcvd req src 172.16.6.10 0000.0c00.6fa2, dst 192.0.2.62IP ARP: rep filtered src 192.0.2.7 aa92.1b36.a456, dst 255.255.255.255 ffff.ffff.ffffIP ARP: rep filtered src 192.0.2.240 0000.0c00.6b31, dst 192.0.2.7 0800.2010.b908In the output, each line of output represents an ARP packet that the device has sent or received. Explanationsfor the individual lines of output follow.
The first line indicates that the device at IP address 192.0.2.7 and with the MAC address 0000.0c01.e117 sentan ARP request for theMAC address of the host at 192.0.2.96. The series of zeros (0000.0000.0000) followingthis address indicate that the device is currently unaware of the MAC address.
IP ARP: sent req src 192.0.2.7 0000.0c01.e117, dst 192.0.2.96 0000.0000.0000The second line indicates that the device at IP address 192.0.2.7 receives a reply from the host at 192.0.2.96indicating that the host MAC address is 0800.2010.b908:
IP ARP: rcvd rep src 192.0.2.96 0800.2010.b908, dst 192.0.2.7The third line indicates that the device receives an ARP request from the host at 172.16.6.10 requesting theMAC address for the host at 192.0.2.62:
IP ARP: rcvd req src 172.16.6.10 0000.0c00.6fa2, dst 192.0.2.62The fourth line indicates that another host on the network attempted to send the device an ARP reply for itsown address. The device ignores meaningless replies. Usually, meaningless replies happen if a bridge is beingrun in parallel with the device and is allowing ARP to be bridged. This condition indicates a networkmisconfiguration.
IP ARP: rep filtered src 192.0.2.7 aa92.1b36.a456, dst 255.255.255.255 ffff.ffff.ffffThe fifth line indicates that another host on the network attempted to inform the device that it is on network192.0.2.240, but the device does not know that the network is attached to a different device interface. Theremote host (probably a PC or an X terminal) is misconfigured. If the device were to install this entry, thedevice would deny service to the real machine on the proper cable.
IP ARP: rep filtered src 192.0.2.240 0000.0c00.6b31, dst 192.0.2.7 0800.2010.b908The following example shows that debugging information related to vpn1 on Ethernet interface 0/0 will belogged:Device> enableDevice# configure terminalDevice(config)# interface ethernet0/0Device(config-if)# vrf forwarding vpn1Device(config-if)# endDevice# debug arp vrf vpn1
Related Commands DescriptionCommand
Configures the extended access list mechanism forfiltering frames by both source and destinationaddresses and arbitrary bytes in the packet.
access-list (extended-ibm)
Enables filtering of debug trace on a per-interface orper-access list basis.
debug list
Lists the debugging options enabled on this device.show debugging
Cisco IOS Debug Command Reference - Commands A through D 107
debug aaa accounting through debug auto-configdebug arp
Cisco IOS Debug Command Reference - Commands A through D108
debug aaa accounting through debug auto-configdebug arp
debug ase
Effective with Cisco IOS Release 12.4(24), the debugase command is not available in Cisco IOS software.Note
To gather Automatic Signature Extraction (ASE) error, log, messaging, reporting, status, and timer information,use the debugase command in privileged EXEC mode. To disable error, log, messaging, reporting, status,and timer information, use the no form of this command.
debug ase {errors| log| messages| reports| status| timing}
no debug ase {errors| log| messages| reports| status| timing}
Syntax Description Displays ASE error information.errors
Displays ASE logging information.log
Displays ASE messaging information.messages
Displays ASE reports.reports
Displays ASE status information.status
Displays ASE timer information.timing
Command Default Disabled
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.4(15)T
This command was removed.12.4(24)
Usage Guidelines This command is used on the Cisco 1800, 2800, and 7200 series routers, Cisco 7301 router, and IntegratedServices Routers (ISRs) as ASE sensors.
Cisco IOS Debug Command Reference - Commands A through D 109
debug aaa accounting through debug auto-configdebug ase
Related Commands DescriptionCommand
Enters the ASE collector server IP address so that theASE sensor has IP connectivity to the ASE collector.
ase collector
Enables the ASE feature on a specified interface.ase enable
Identifies the TIDP group number for the ASE feature.ase group
Enables the ASE feature globally on the router.ase signature extraction
Clears ASE signatures that were detected on therouter.
clear ase signature
Displays the ASE run-time status, which includes theTIDP group number.
show ase
Cisco IOS Debug Command Reference - Commands A through D110
debug aaa accounting through debug auto-configdebug ase
debug asnl eventsTo trace event logs in the Application Subscribe Notify Layer (ASNL), use the debugasnlevents commandin privileged EXEC mode. To disable debugging output, use the no form of this command.
debug asnl events
no debug asnl events
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.3(4)T
Usage Guidelines This command traces the event logs in the ASNL, which serves as the interface layer between the applicationand protocol stacks. Event logs are generated during normal subscription processing, when the applicationresponds to the notification request and when the session history table is updated.
Examples The following example shows the ASNL subscription table being generated and the associated subscriptiontimers as the application responds to the subscription request. The response timer is started to determine ifthe application responds to the notification request. If the application that made the subscription does notrespond to the notification request within 5 seconds, the system automatically removes the subscription. Thesession-history-record deletion timer is also started. When the timer expires, the history record is removedfrom the active subscription table.
Router# debug asnl events
Application Subscribe Notify Layer Events debugging is on*May 4 06:26:19.091://-1//ASNL:SUB-1:/asnl_process_is_up:Creating subscription table*May 4 06:26:19.091://5//ASNL:SUB1:/asnl_subscribe:resp = ASNL_SUBCRIBE_PENDING[2]*May 4 06:26:19.615://5//ASNL:SUB1:/asnl_start_timer:timer (0x63146C44)starts - delay(5000)*May 4 06:26:19.619://-1//ASNL:SUB1:/asnl_stop_timer:timer(0x63146C44) stops*May 4 06:26:19.619://-1//ASNL:SUB1:/asnl_notify_ack:ret=0x0c5300-5#*May 4 06:26:24.631://5//ASNL:SUB1:/asnl_start_timer:timer (0x63146C44)starts - delay(5000)*May 4 06:26:24.631://-1//ASNL:SUB1:/asnl_stop_timer:timer(0x63146C44) stops*May 4 06:26:24.635://-1//ASNL:SUB1:/asnl_notify_ack:ret=0x0c5300-5#*May 4 06:26:29.647://5//ASNL:SUB1:/asnl_start_timer:timer (0x63146C44)starts - delay(5000)*May 4 06:26:29.647://-1//ASNL:SUB1:/asnl_stop_timer:timer(0x63146C44) stops
Cisco IOS Debug Command Reference - Commands A through D 111
debug aaa accounting through debug auto-configdebug asnl events
*May 4 06:26:29.651://-1//ASNL:SUB1:/asnl_notify_ack:ret=0x0*May 4 06:26:34.663://5//ASNL:SUB1:/asnl_start_timer:timer (0x63146C44)starts - delay(5000)*May 4 06:26:34.663://-1//ASNL:SUB1:/asnl_stop_timer:timer(0x63146C44) stops*May 4 06:26:34.667://-1//ASNL:SUB-1:/asnl_create_session_history:Creating Session History
*May 4 06:26:34.667://-1//ASNL:SUB-1:/asnl_insert_session_history_record:starting historyrecord deletion_timer of 15 minutes*May 4 06:26:34.667://-1//ASNL:SUB1:/asnl_notify_ack:ret=0x0
Related Commands DescriptionCommand
Clears all active subscriptions or a specificsubscription.
clear subscription
Displays information about ASNL-based andnon-ASNL-based SIP subscriptions.
show subscription
Specifies how long to keepASNL subscription historyrecords and how many history records to keep inmemory.
subscription asnl session history
Cisco IOS Debug Command Reference - Commands A through D112
debug aaa accounting through debug auto-configdebug asnl events
debug asp packetTo display information on all asynchronous security protocols (ASPs) operating on the router, use thedebugasppacketcommand in privileged EXEC mode. To disable debugging output, use the noform of thiscommand.
debug asp packet
no debug asp packet
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines The router uses asynchronous security protocols from companies including ADT Security Systems, Inc.,Adplex, and Diebold to transport alarm blocks between two devices (such as a security alarm system consoleand an alarm panel). The alarm blocks are transported in pass-through mode using BSTUN encapsulation.
Examples The following is partial sample output from the debugasppacket command for asynchronous security protocolswhen packet debugging is enabled on an asynchronous line carrying Diebold alarm traffic. In this example,two polls are sent from the Diebold alarm console to two alarm panels that are multidropped from a singleEIA/TIA-232 interface. The alarm panels have device addresses F0 and F1. The example trace indicates thatF1 is responding and F0 is not responding. At this point, you need to examine the physical link and possiblyuse a datascope to determine why the device is not responding.
Router# debug asp packet12:19:48: ASP: Serial5: ADI-Rx: Data (4 bytes): F1FF4C4212:19:49: ASP: Serial5: ADI-Tx: Data (1 bytes): 8812:19:49: ASP: Serial5: ADI-Rx: Data (4 bytes): F0FF9B9412:20:47: ASP: Serial5: ADI-Rx: Data (4 bytes): F1FF757B12:20:48: ASP: Serial5: ADI-Tx: Data (1 bytes): F312:20:48: ASP: Serial5: ADI-Rx: Data (4 bytes): F0FFB1BE12:21:46: ASP: Serial5: ADI-Rx: Data (4 bytes): F1FFE6E812:21:46: ASP: Serial5: ADI-Tx: Data (1 bytes): 6F12:21:46: ASP: Serial5: ADI-Rx: Data (4 bytes): F0FFC1CEThe table below describes the significant fields shown in the display.
Table 22: debug asp packet Field Descriptions
DescriptionField
Asyncronous security protocol packet.ASP
Interface receiving and sending the packet.Serial5
Packet is being received.ADI-Rx
Packet is being sent.ADI-T
Cisco IOS Debug Command Reference - Commands A through D 113
debug aaa accounting through debug auto-configdebug asp packet
DescriptionField
Type and size of the packet.Data (n bytes)
Alarm panel device address.F1FF4c42
Cisco IOS Debug Command Reference - Commands A through D114
debug aaa accounting through debug auto-configdebug asp packet
debug aspp eventTo display asynchronous point of sale (APOS) event debug messages, use the debugasppeventcommand inprivileged EXEC mode. To disable debugging output, use the no form of this command.
debug aspp event
no debug aspp event
Syntax Description This command has no arguments or keywords.
Command Default Disabled
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.3(2)T
Usage Guidelines The debugasppeventcommand should be used with the debugaspppacket command to display all availabledetails of the APOS call flow.
Examples The following is sample output from the debugasppeventcommand for a simple transaction:
Router# debug aspp eventASPP event debugging is onRouter#ASPP APOS: Serial0/1: Serial HayesAT: state = DISCONNECTEDASPP APOS: Serial0/1: Received HayesAT DIAL: state = DISCONNECTEDASPP APIP: Serial0/1: Serial ENABLE: state = CONNECTINGASPP APIP: Serial0/1: Network ENABLE: state = CONNECTINGASPP APOS: Serial0/1: Send HayesAT CONNECT 9600: state = CONNECTEDASPP APOS: Serial0/1: Response timer expired: state = CONNECTEDASPP APOS: Serial0/1: Response timer expired: state = CONNECTEDASPP APOS: Serial0/1: Serial DATA: state = CONNECTEDASPP APIP: Serial0/1: Serial DATA: state = CONNECTEDASPP APIP: Serial0/1: Network DATA: state = CONNECTEDASPP APOS: Serial0/1: Serial ACK: state = CONNECTEDASPP APOS: Serial0/1: Disconnect timer expired: state = DISCONNECT WAITASPP APIP: Serial0/1: Serial DISABLE: state = DISCONNECTINGASPP APIP: Serial0/1: Network DISABLE: state = DISCONNECTINGThe table below describes the significant fields shown in the display.
Table 23: debug aspp event Field Descriptions
DescriptionField
Enable event received from the serial interface.Serial ENABLE:
Cisco IOS Debug Command Reference - Commands A through D 115
debug aaa accounting through debug auto-configdebug aspp event
DescriptionField
Enable event received from the network.Network ENABLE:
Interpreted version of the Hayes AT command thatis sent to the serial interface.
Send HayesAT CONNECT
The response timer has expired.Response timer expired
Data received from the serial interface.Serial DATA:
Data received from the network.Network DATA:
Hayes AT event is received by the serial interface.Disconnect timer expired
Acknowledgment received from the serial interface.Serial ACK:
Disable event received from the serial interface.Serial DISABLE:
Disable event received from the network.Network DISABLE:
Related Commands DescriptionCommand
Displays APOS packet debug messages.debug aspp packet
Cisco IOS Debug Command Reference - Commands A through D116
debug aaa accounting through debug auto-configdebug aspp event
debug aspp packetTo display asynchronous point of sale (APOS) packet debug messages, use the debugaspppacketcommandin privileged EXEC mode. To disable debugging output, use the no form of this command.
debug aspp packet
no debug aspp packet
Syntax Description This command has no arguments or keywords.
Command Default Disabled
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.3(2)T
Usage Guidelines The debugaspppacketcommand should be used with the debugasppevent command to display all availabledetails of the APOS call flow.
Examples The following is sample output from the debugaspppacketcommand for a simple transaction:
Router# debug aspp packetASPP event debugging is onRouter#ASPP:Serial1/7:ADI-rx:Data (14 bytes): 415456302644325331313D35300DASPP:Serial1/7:ADI-tx:Data (2 bytes): 300DASPP:Serial1/7:ADI-rx:Data (27 bytes): 4154583453393D3153373D323444543138303039ASPP:Serial1/7:ADI-tx:Data (3 bytes): 31320DASPP:Serial1/7:ADI-tx:Data (1 bytes): 05ASPP:Serial1/7:ADI-rx:Data (5 bytes): 0212340325ASPP:Serial1/7:ADI-tx:Data (5 bytes): 025678032DASPP:Serial1/7:ADI-rx:Data (1 bytes): 06ASPP:Serial1/7:ADI-tx:Data (1 bytes): 04The table below describes the significant fields shown in the display.
Table 24: debug aspp packet Field Descriptions
DescriptionField
Indicates that this is an ASPP debug message.ASPP
The interface that received or transmitted the packet.Serial1/7:
Cisco IOS Debug Command Reference - Commands A through D 117
debug aaa accounting through debug auto-configdebug aspp packet
DescriptionField
Indicates a received packet.ADI-rx
Indicates a transmitted packet.ADI-tx
Related Commands DescriptionCommand
Displays APOS event debug messages.debug aspp event
Cisco IOS Debug Command Reference - Commands A through D118
debug aaa accounting through debug auto-configdebug aspp packet
debug async async-queueTo display debugmessages for asynchronous rotary line queueing, use the debugasyncasync-queuecommandin privileged EXEC mode. To disable debugging output, use the no form of this command.
debug async async-queue
no debug async async-queue
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.1(1)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Examples The following example starts the asynchronous rotary line queueing debugging display:
Router# debug async async-queue*Mar 2 03:50:28.377: AsyncQ: First connection to be queued - starting the AsyncQ manager*Mar 2 03:50:28.377: AsyncQ: Enabling the AsyncQ manager*Mar 2 03:50:28.377: AsyncQ: Started the AsyncQ manager process with pid 98*Mar 2 03:50:28.381: AsyncQ: Created a Waiting TTY on TTY66 with pid 99*Mar 2 03:50:30.164: WaitingTTY66: Did Authentication on waiting TTY (VTY)*Mar 2 03:50:30.168: AsyncQ: Received ASYNCQ_MSG_ADD*Mar 2 03:50:30.168: AsyncQ: New queue, adding this connection as the first element*Mar 2 03:50:34.920: AsyncQ: Created a Waiting TTY on TTY67 with pid 100*Mar 2 03:50:36.783: WaitingTTY67: Did Authentication on waiting TTY (VTY)*Mar 2 03:50:36.787: AsyncQ: Received ASYNCQ_MSG_ADD*Mar 2 03:50:36.787: AsyncQ: Queue exists, adding this connection to the end of the queue
Related Commands DescriptionCommand
Enables the IP TCP transactions debugging displayto observe significant transactions such as statechanges, retransmissions, and duplicate packets.
debug ip tcp transactions
Enables the modem debugging display to observemodem line activity on an access server.
debug modem
Cisco IOS Debug Command Reference - Commands A through D 119
debug aaa accounting through debug auto-configdebug async async-queue
debug atm autovcTo display information about autoprovisioned ATM permanent virtual circuit (PVC) events and errors, usethe debug atm autovc command in privileged EXEC mode. To disable the display of information aboutautoprovisioned ATM PVC events and errors, use the no form of this command.
debug atm autovc {event| error| all}
no debug atm autovc {event| error| all}
Syntax Description Displays all autoprovisioned PVC events.event
Displays all autoprovisioned PVC errors.error
Displays all autoprovisioned PVC events and errors.all
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(15)B
This command was integrated into Cisco IOS Release 15.0(1)M.15.0(1)M
This command was integrated into Cisco IOS Release 12.2(28)SB.12.2(28)SB
This command was integrated into Cisco IOS Release 12.2(33)SRE.12.2(33)SRE
Examples The following example shows output for the debug atm autovc command for all autoprovisioned PVC eventsand errors:
Router# debug atm autovc allAutoVC all debugging is on00:09:03:AutoVC(ATM1/0):1/101 enqueuedThis message indicates that there is incoming traffic on PVC 1/101 and the PVC is enqueued to be processed.
00:09:03:AutoVC(ATM1/0):process VC 1/101This message indicates that PVC 1/101 is in the process of being autoprovisioned.
00:09:03:AutoVC(ATM1/0.1):bring up vc 1/101This message indicates that PVC 1/101 is being brought up.
00:09:03:%ATM-5-UPDOWN:Interface ATM1/0.1, Changing autovc 1/101 to UPThis message indicates that the PVC was brought up successfully.
Cisco IOS Debug Command Reference - Commands A through D120
debug aaa accounting through debug auto-configdebug atm autovc
Related Commands DescriptionCommand
Configures ATM PVC autoprovisioning, whichenables a PVC or range of PVCs to be createdautomatically on demand.
create on-demand
Cisco IOS Debug Command Reference - Commands A through D 121
debug aaa accounting through debug auto-configdebug atm autovc
debug atm bundle errorTo display debug messages for switched virtual circuit (SVC) bundle errors, use thedebugatmbundleerrorcommand in privileged EXEC mode. To disable debugging output, use the no formof this command.
debug atm bundle error
no debug atm bundle error
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(4)T
Examples The following example provides output for the debugatmbundleerrorcommand:
Router#debug atm bundle error
Related Commands DescriptionCommand
Displays SVC bundle events.debug atm bundle events
Cisco IOS Debug Command Reference - Commands A through D122
debug aaa accounting through debug auto-configdebug atm bundle error
debug atm bundle eventsTo display switched virtual circuit (SVC) bundle events, use the debugatmbundleeventscommand in privilegedEXEC mode. To disable debugging output, use the no form of this command.
debug atm bundle events
no debug atm bundle events
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(4)T
Examples The following example provides output for the debugatmbundleeventscommand:
Router# debug atm bundle events01:14:35:BUNDLE EVENT(test):b_update_vc for four with bstate 1, vc_state401:14:35:BUNDLE EVENT(test):bmupdate active precedence 0x01 001:14:35:BUNDLE EVENT(test):bmupdate active precedence 0x02 001:14:35:BUNDLE EVENT(test):bmupdate active precedence 0x04 001:14:35:BUNDLE EVENT(test):bmupdate active precedence 0x08 001:14:35:BUNDLE EVENT(test):bmupdate active precedence 0x10 001:14:35:BUNDLE EVENT(test):bmupdate active precedence 0x20 001:14:35:BUNDLE EVENT(test):bmupdate active precedence 0x40 001:14:35:BUNDLE EVENT(test):bmupdate active precedence 0x80 0 -01:14:35:BUNDLE EVENT(test):bundle precedence updatedThe table below describes the significant fields shown in the display.
Table 25: debug atm bundle events Field Descriptions
DescriptionField
Local time on the router in hours:minutes:seconds.01:14:35
Bundle event for bundle by that name.BUNDLE EVENT(test)
Test describing the bundle event.b_update_vc for four with bstate 1, vc_state 1
Cisco IOS Debug Command Reference - Commands A through D 123
debug aaa accounting through debug auto-configdebug atm bundle events
Related Commands DescriptionCommand
Displays debug messages for SVC bundle errors.debug atm bundle error
Cisco IOS Debug Command Reference - Commands A through D124
debug aaa accounting through debug auto-configdebug atm bundle events
debug atm cell-packingTo enable the display of ATM cell relay cell-packing debugging information, use the debug atm cell-packingcommand in privileged EXEC mode. To disable the display of debugging information, use the no form ofthis command.
debug atm cell-packing
no debug atm cell-packing
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.0(25)S
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Examples The following example enables debugging for ATM virtual circuits (VCs) that have been configured withcell packing:
Router# debug atm cell-packingATM Cell Packing debugging is on00:09:04: ATM Cell Packing: vc 1/100 remote mncp 22 validatedThe following example enables debugging for permanent virtual paths (PVPs) that have been configured withcell packing:
Router# debug atm cell-packingATM Cell Packing debugging is on00:12:33: ATM Cell Packing: vp 1 remote mncp 22 validatedThe output indicates that the router received the MNCP information from the remote PE router.
Related Commands DescriptionCommand
Creates cell-packing timers that specify how long thePE router can wait for cells to be packed into anMPLS or L2TPv3 packet.
atm mcpt-timers
Enables the packing of multiple ATM cells into asingle MPLS or L2TPv3 packet.
cell-packing
Cisco IOS Debug Command Reference - Commands A through D 125
debug aaa accounting through debug auto-configdebug atm cell-packing
DescriptionCommand
Displays information about the VCs and VPs thathave ATM cell relay over MPLS or L2TPv3 cellpacking enabled.
show atm cell-packing
Cisco IOS Debug Command Reference - Commands A through D126
debug aaa accounting through debug auto-configdebug atm cell-packing
debug atm eventsTo display ATM events, use the debugatmeventscommand in privileged EXEC mode. To disable eventdebugging output, use the no form of this command.
debug atm events
no debug atm events
Syntax Description This command has no arguments or keywords.
Command Default ATM event debugging is disabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced on the Cisco 1700 series routers.12.1(3)XJ
This command was implemented on the Cisco IAD2420 Series.12.1(5)XR1
This command was integrated into Cisco IOS Release 12.2(4)T.12.2(4)T
Usage Guidelines This command displays ATM events that occur on the ATM interface processor and is useful for diagnosingproblems in an ATM network. It provides an overall picture of the stability of the network. In a stable network,the debugatmevents command does not return any information. If the command generates numerousmessages,the messages can indicate the possible source of problems.
When configuring or making changes to a router or interface for ATM, enable the debugatmeventscommand.Doing so alerts you to the progress of the changes or to any errors that might result. Also use this commandperiodically when you suspect network problems.
Examples The following is sample output from the debugatmevents command:
Router# debug atm events
RESET(ATM4/0): PLIM type is 1, Rate is 100Mbpsaip_disable(ATM4/0): state=1config(ATM4/0)aip_love_note(ATM4/0): asr=0x201aip_enable(ATM4/0)aip_love_note(ATM4/0): asr=0x4000aip_enable(ATM4/0): restarting VCs: 7aip_setup_vc(ATM4/0): vc:1 vpi:1 vci:1aip_love_note(ATM4/0): asr=0x200aip_setup_vc(ATM4/0): vc:2 vpi:2 vci:2aip_love_note(ATM4/0): asr=0x200aip_setup_vc(ATM4/0): vc:3 vpi:3 vci:3
Cisco IOS Debug Command Reference - Commands A through D 127
debug aaa accounting through debug auto-configdebug atm events
aip_love_note(ATM4/0): asr=0x200aip_setup_vc(ATM4/0): vc:4 vpi:4 vci:4aip_love_note(ATM4/0): asr=0x200aip_setup_vc(ATM4/0): vc:6 vpi:6 vci:6aip_love_note(ATM4/0): asr=0x200aip_setup_vc(ATM4/0): vc:7 vpi:7 vci:7aip_love_note(ATM4/0): asr=0x200aip_setup_vc(ATM4/0): vc:11 vpi:11 vci:11aip_love_note(ATM4/0): asr=0x200The table below describes the significant fields shown in the display.
Table 26: debug atm events Field Descriptions
DescriptionField
Indicates the interface rate in megabits per second(Mbps). Possible values are:
• 1 = TAXI(4B5B) 100 Mbps
• 2 = SONET 155 Mbps
• 3 = E3 34 Mbps
PLIM type
Indicates current state of the ATM Interface Processor(AIP). Possible values are:
• 1 = An ENABLE will be issued soon.
• 0 = The AIP will remain shut down.
state
Defines a bitmask, which indicates actions orcompletions to commands. Valid bitmask values are:
• 0x0800 = AIP crashed, reload may be required.
• 0x0400 = AIP detected a carrier state change.
• 0x0n00 = Command completion status.Command completion status codes are:
• n = 8 Invalid Physical Layer InterfaceModule (PLIM) detected
• n = 4 Command failed
• n = 2 Command completed successfully
• n = 1 CONFIG request failed
• n = 0 Invalid value
asr
The following line indicates that the AIP was reset. The PLIM TYPE detected was 1, so the maximum rateis set to 100 Mbps.
RESET(ATM4/0): PLIM type is 1, Rate is 100Mbps
Cisco IOS Debug Command Reference - Commands A through D128
debug aaa accounting through debug auto-configdebug atm events
The following line indicates that the AIP was given a shutdown command, but the current configurationindicates that the AIP should be up:
aip_disable(ATM4/0): state=1The following line indicates that a configuration command has been completed by the AIP:
aip_love_note(ATM4/0): asr=0x201The following line indicates that the AIP was given a no shutdown command to take it out of shutdown:
aip_enable(ATM4/0)The following line indicates that the AIP detected a carrier state change. It does not indicate that the carrieris down or up, only that it has changed.
aip_love_note(ATM4/0): asr=0x4000The following line of output indicates that the AIP enable function is restarting all permanent virtual circuits(PVCs) automatically:
aip_enable(ATM4/0): restarting VCs: 7The following lines of output indicate that PVC 1 was set up and a successful completion code was returned:
aip_setup_vc(ATM4/0): vc:1 vpi:1 vci:1aip_love_note(ATM4/0): asr=0x200
Cisco IOS Debug Command Reference - Commands A through D 129
debug aaa accounting through debug auto-configdebug atm events
debug atm ha-errorTo debug ATM) high-availability (HA errors on a networking device, use the debugatmha-error commandin privileged EXEC mode. To disable the display of debugging output, use the no form of this command.
debug atm ha-error
no debug atm ha-error
Syntax Description This command has no arguments or keywords.
Command Default Debugging is disabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced on Cisco 7500, 10000, and 12000 seriesInternet routers.
12.0(22)S
This command was integrated into Cisco IOS Release 12.2(18)S on Cisco7500 series routers.
12.2(18)S
Support was added for the Cisco 7304 router. The Cisco 7500 series routeris not supported in Cisco IOS Release 12.2(20)S.
12.2(20)S
This command was integrated into Cisco IOS Release 12.2(28)SB.12.2(28)SB
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SXH.12.2(33)SXH
Examples The following example displays debug messages regarding ATM HA errors on the networking device:
Router# debug atm ha-error
Related Commands DescriptionCommand
Debugs ATM HA events on the networking device.debug atm ha-events
Debugs ATMHA state information on the networkingdevice.
debug atm ha-state
Cisco IOS Debug Command Reference - Commands A through D130
debug aaa accounting through debug auto-configdebug atm ha-error
Cisco IOS Debug Command Reference - Commands A through D 131
debug aaa accounting through debug auto-configdebug atm ha-error
debug atm ha-eventsTo debugATMhigh-availability (HA) events on the networking device, use the debugatmha-events commandin privileged EXEC mode. To disable the display of debugging output, use the no form of this command.
debug atm ha-events
no debug atm ha-events
Syntax Description This command has no arguments or keywords.
Command Default Debugging is disabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced on Cisco 7500, 10000, and 12000 seriesInternet routers.
12.0(22)S
This command was integrated into Cisco IOS Release 12.2(18)S on Cisco7500 series routers.
12.2(18)S
Support was added for the Cisco 7304 router. The Cisco 7500 series routeris not supported in Cisco IOS Release 12.2(20)S.
12.2(20)S
This command was integrated into Cisco IOS Release 12.2(28)SB.12.2(28)SB
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SXH.12.2(33)SXH
Examples The following example displays debug messages regarding ATM HA events on the networking device:
Router# debug atm ha-events
Related Commands DescriptionCommand
Debugs ATM HA errors on the networking device.debug atm ha-error
Debugs ATMHA state information on the networkingdevice.
debug atm ha-state
Cisco IOS Debug Command Reference - Commands A through D132
debug aaa accounting through debug auto-configdebug atm ha-events
debug atm ha-stateTo debug ATM high-availability (HA) state information on the networking device, use the debugatmha-statecommand in privileged EXEC mode. To disable the display of debugging output, use the no form of thiscommand.
debug atm ha-state
no debug atm ha-state
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced on Cisco 7500, 10000, and 12000 seriesInternet routers.
12.0(22)S
This command was integrated into Cisco IOS Release 12.2(18)S on Cisco7500 series routers.
12.2(18)S
Support was added for the Cisco 7304 router. The Cisco 7500 series routeris not supported in Cisco IOS Release 12.2(20)S.
12.2(20)S
This command was integrated into Cisco IOS Release 12.2(28)SB.12.2(28)SB
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SXH.12.2(33)SXH
Examples The following example displays debug messages regarding the ATM HA state on the networking device:
Router# debug atm ha-state
Related Commands DescriptionCommand
Debugs ATM HA errors on the networking device.debug atm ha-error
Debugs ATM HA events on the networking device.debug atm ha-events
Cisco IOS Debug Command Reference - Commands A through D 133
debug aaa accounting through debug auto-configdebug atm ha-state
debug atm l2transportTo enable the display of debugging information related to ATM over MPLS, use the debug atm l2transportcommand in privileged EXEC mode. To disable the display of debugging information, use the no form ofthis command.
debug atm l2transport
no debug atm l2transport
Syntax Description This command has no arguments or keywords.
Command Default Debugging of ATM over MPLS is not enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.0(25)S
This commandwas integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Examples The following example shows the events and messages when configuring ATM Cell Relay over MPLS in VPmode.
Router# debug atm l2transportATM L2transport Events and Errors debugging is onRouter# show debugATM L2transport:ATM L2transport Events and Errors debugging is on
Router(config-if)# atm pvp 24 l2transportRouter(cfg-if-atm-l2trans-pvp)# xconnect 11.11.11.11 700 pw-class vpRouter(cfg-if-atm-l2trans-pvp)# end00:14:51: ATM L2trans(ATM1/0): VP 24 is created00:14:51: ATM L2trans(ATM1/0): ckt_type 10, ckt_id 1000024 UP00:14:51: ATM L2trans(ATM1/0): VP 24, response is connect forwardedThe following example shows the events and messages when deleting a PVP.
Router(config-if)# no atm pvp 24 l2transport00:14:37: ATM L2trans(ATM1/0): ckt_type 10, ckt_id 1000024 DOWN00:14:37: ATM L2trans(ATM1/0): ckt_type 10, ckt_id 1000024 DOWN00:14:37: ATM L2trans(ATM1/0): remove xconnect circuit_type=10,circuit_id=100002400:14:37: ATM L2trans(ATM1/0): ckt_type 10, ckt_id 1000024 DOWN
Cisco IOS Debug Command Reference - Commands A through D134
debug aaa accounting through debug auto-configdebug atm l2transport
Related Commands DescriptionCommand
Displays information about AToM circuits that havebeen enabled to route Layer 2 packets on a router.
show mpls l2transport vc
Cisco IOS Debug Command Reference - Commands A through D 135
debug aaa accounting through debug auto-configdebug atm l2transport
debug atm lfiTo display multilink PPP (MLP) over ATM link fragmentation and interleaving (LFI) debug information, usethe debugatmlfi command in privileged EXEC mode. To disable debugging output, use the no form of thiscommand.
debug atm lfi
no debug atm lfi
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.3(7)T
This command was integrated into Cisco IOS Release 12.2(28)SB.12.2(28)SB
Examples The following examples show output from the debugatmlfi command. Each example is preceded by anexplanation of the output.
• The following output indicates that the packet has dequeued from the per-VC queue that is associatedwith the virtual circuit (VC):
00:17:27: MLP-ATM(Virtual-Access3) pak dequeued from per VC Q 15/200,qcount:0
• The following output indicates that the packet is enqueued on the per-VC queue associated with the VC:
00:17:27: MLP-ATM(Virtual-Access3) pak enqueued to per VC Q 15/200, qcount:0
• The following output indicates that the packet has dequeued from the MLP bundle queue:
00:17:27: MLP-ATM(Virtual-Access3) pak dequeued from MP Bundle 15/200, qcount:0
• The following output indicates that PPP over ATM (PPPoA) encapsulation cannot be added to the packetfor some reason:
00:17:27: MLP-ATM(Virtual-Access3) encapsulation failure - dropping packet
• The following output indicates that the VC could not be found on the virtual access interface associatedwith the PPPoA session:
00:17:27: MLP-ATM(Virtual-Access3) No VC to transmit- dropping packet
Cisco IOS Debug Command Reference - Commands A through D136
debug aaa accounting through debug auto-configdebug atm lfi
•When a permanent virtual circuit (PVC) has been deleted, the following output indicates that MLP hasbeen deconfigured successfully:
00:17:27: MLP-ATM(Virtual-Access3) mlp de-configured for PVC 15/200
• If the changing of any PVC parameters requires re-creation of the PVC, the following output is generatedduring the re-creation of the PVC:
00:17:27: MLP-ATM(Virtual-Access3) MLPoATM re-configured for PVC 15/200
• The following output indicates that the MLP over ATM structure associated with a VC has failed toallocate memory:
00:17:27: MLP-ATM(Virtual-Access3) Memory allocation error
• The following output is generated when MLP over ATM is first configured on a PVC:
00:17:27: MLP-ATM(Virtual-Access3) MLPoATM configured for PVC 15/200
Related Commands DescriptionCommand
Displays bundle information for MLP bundles.show multilink ppp
Cisco IOS Debug Command Reference - Commands A through D 137
debug aaa accounting through debug auto-configdebug atm lfi
debug atm nativeTo display ATM switched virtual circuit (SVC) signaling events, use the debugatmnative command inprivileged EXEC mode. To disable debugging output, use the no form of this command.
debug atm native {[api]| [conn]| [error]| [filter]}
no debug atm native
Syntax Description (Optional) Native ATM application programminginterface (API). Displays events that occur as a resultof the exchange between the native ATM API andthe signaling API.
api
(Optional) NativeATMconnectionmanager. Displaysinternal connection manager events for the nativeATM API.
conn
(Optional) Native ATM error. Displays errors thatoccur during the setup of an ATM SVC.
error
(Optional) Native ATM filter. Displays the internalnetwork service access point (NSAP) filter events ofthe native ATM API.
filter
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(8)T
Usage Guidelines Native ATMAPI is the layer above the signaling API. Static map and Resource Reservation Protocol (RSVP)clients use the native ATM API to interact with the signaling API to create ATM SVCs.
Use the debugatmnative command to diagnose problems in the creation of static map and RSVPATMSVCs.
Examples The following is sample output for the debugatmnative command with the api keyword:
Router# debug atm native api0:24:59:NATIVE ATM :associate endpoint
Cisco IOS Debug Command Reference - Commands A through D138
debug aaa accounting through debug auto-configdebug atm native
00:24:59:NATIVE ATM :ID (3) prep outgoing call, conn_type 000:24:59:NATIVE ATM :ID (3) set connection attribute for 500:24:59:NATIVE ATM :ID (3) query connection attribute 800:24:59:NATIVE ATM :ID (3) set connection attribute for 800:24:59:NATIVE ATM :ID (3) set connection attribute for 900:24:59:NATIVE ATM :ID (3) set connection attribute for 1000:24:59:NATIVE ATM :ID (3) set connection attribute for 700:24:59:NATIVE ATM :ID (3) set connection attribute for 600:24:59:NATIVE ATM :ID (3) set connection attribute for 200:24:59:NATIVE ATM :ID (3) set connection attribute for 000:24:59:NATIVE ATM :ID (3) query connection attribute 1200:24:59:NATIVE ATM :ID (3) set connection attribute for 1200:24:59:NATIVE ATM :ID (3) query connection attribute 1300:24:59:NATIVE ATM :ID (3) set connection attribute for 1300:24:59:NATIVE ATM :ID (3) connect outgoing call00:24:59:NATIVE ATM :ID (3) callback, CONNECT received
Cisco IOS Debug Command Reference - Commands A through D 139
debug aaa accounting through debug auto-configdebug atm native
debug atm nbmaTo display setup and teardown events for ATM switched virtual circuits (SVCs) configured using the ResourceReservation Protocol (RSVP), use the debugatmnbmacommand in privileged EXEC mode. To disabledebugging output, use the no form of this command.
debug atm nbma [api]
no debug atm nbma
Syntax Description (Optional) Nonbroadcast multiaccess (NBMA)ATMapplication programming interface (API). Displaysevents that occur as a result of the exchange betweenRSVP and the NBMA API.
api
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(8)T
Usage Guidelines Use the debugatmnbma command to diagnose problems in the creation of RSVP SVCs.
The RSVP application creates SVCs by using the NBMA API. The debugatmnbma command withtheapikeyword displays events that occur as a result of the exchange between RSVP and the NBMA API.
Examples The following is sample output for the debugatmnbma command:
Router# debug atm nbma api00:52:50:NBMA-ATM-API - atm_setup_req00:52:50:NBMA_ATM-API - nbma_atm_fill_blli00:52:50:NBMA_ATM-API - nbma_atm_fill_bhli00:52:50:NBMA_ATM-API - nbma_atm_callbackMsg - NATIVE_ATM_OUTGOING_CALL_ACTIVE00:52:50:NBMA_ATM-API - rcv_outgoing_call_active00:52:50:NBMA_ATM-API - nbma_svc_lookup
Cisco IOS Debug Command Reference - Commands A through D140
debug aaa accounting through debug auto-configdebug atm nbma
debug atm oam ccTo display ATM operation, administration, and maintenance (OAM) F5 continuity check (CC) managementactivity, use the debugatmoamcccommand in privileged EXEC mode. To disable debugging output, use theno form of this command.
debug atm oam cc [interface atm number]
no debug atm oam cc [interface atm number]
Syntax Description (Optional) Number of the ATM interface.interface atm number
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(2)XB
This command was integrated into Cisco IOS Release 12.2(13)T.12.2(13)T
This command was integrated into Cisco IOS Release 12.2(28)SB.12.2(28)SB
Examples The following sample output for the debugatmoamcc command records activity beginning with the entry oftheoam-pvcmanagecc command and ending with the entry of thenooam-pvcmanagecc command. The ATM0 interface is specified, and the "both" segment direction is specified. The output shows an activation requestsent and confirmed, a series of CC cells sent by the routers on each end of the segment, and a deactivationrequest and confirmation.
Router# debug atm oam cc interface atm0Generic ATM:ATM OAM CC cells debugging is on
Router#00:15:05: CC ACTIVATE MSG (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAMType:8 OAM Func:1 Direction:3 CTag:500:15:05: CC ACTIVATE CONFIRM MSG (ATM0) O:VCD#1 VC 1/40 OAM CellType:4 OAM Type:8 OAM Func:1 Direction:3 CTag:500:15:06: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:100:15:07: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:400:15:08: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:400:15:09: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:400:15:10: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:400:15:11: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:400:15:12: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:400:15:13: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:400:15:14: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:4
Cisco IOS Debug Command Reference - Commands A through D 141
debug aaa accounting through debug auto-configdebug atm oam cc
00:15:15: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:400:15:16: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:400:15:17: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:400:15:18: CC CELL (ATM0) O:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:400:15:19: CC CELL (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAM Type:1 OAM Func:400:15:19: CC DEACTIVATE MSG (ATM0) I:VCD#1 VC 1/40 OAM Cell Type:4 OAMType:8 OAM Func:1 Direction:3 CTag:600:15:19: CC DEACTIVATE CONFIRM MSG (ATM0) O:VCD#1 VC 1/40 OAM CellType:4 OAM Type:8 OAM Func:1 Direction:3 CTag:6The table below describes the significant fields shown in the display.
Table 27: debug atm oam cc Field Descriptions
DescriptionField
Time stamp.00:15:05
Message type and interface.CC ACTIVATE MSG (ATM0)
Source.0
Sink.1
Virtual circuit identifier.VC 1/40
Direction in which the cells are traveling. May be oneof the following values:
1-- local router is the sink.
2-- local router is the source.
3-- both routers operate as the source and sink.
Direction:3
Related Commands DescriptionCommand
Configures ATM OAM F5 CC management.oam-pvc manage cc
Displays all ATM PVCs and traffic information.show atm pvc
Cisco IOS Debug Command Reference - Commands A through D142
debug aaa accounting through debug auto-configdebug atm oam cc
debug atm oc3 pomTo display debug messages for ATM-OC3 Provisioning Object Manager (POM) network modules, use thedebugatmoc3pom command in privileged EXEC mode. To disable debugging output, use the no form ofthis command.
debug atm oc3 pom {data| flow| pa| sar| sfp| trace}
no debug atm oc3 pom {data| flow| pa| sar| sfp| trace}
Syntax Description Displays debug messages for incoming packetindications.
data
Displays debugmessages for flow control indications.flow
Displays debug messages for online insertion orremoval (OIR) of the ATM-OC3 POM networkmodule.
pa
Displays debug messages for blocking commandssent to the segmentation and reassembly (SAR) andtheir acknowledgments.
sar
Displays debug messages for OIR of modules in theSFP port of the network module.
sfp
Displays debug messages that give the hexadecimalrepresentation of commands sent to the SAR and theiracknowledgments.
trace
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.4(2)T
Usage Guidelines debug atm oc3 pom data command
Use the debugatmoc3pomdata command to display the incoming packet indications. Each incoming packettransferred by direct memory access (DMA) to the host memory by the SAR will cause a packet indication.
debug atm oc3 pom flow command
Use the debugatmoc3pomflow command to display flow control indications.
Cisco IOS Debug Command Reference - Commands A through D 143
debug aaa accounting through debug auto-configdebug atm oc3 pom
When traffic sent to the SAR exceeds the peak cell rate for a particular virtual circuit (VC), the SAR indicatesthis to the host by sending flow control indications. These indications inform the host that either the highwatermark or the low watermark has been reached for that VC queue.
When a high watermark is received from the SAR, indicating that the VC queue is full, the host will stopsending packets to the SAR until a low watermark indication is received. A low watermark indicates that theVC queue has been drained sufficiently to receive additional packets.
debug atm oc3 pom pa command
Use the debugatmoc3pompacommand on those platforms supporting OIR to display the indications generatedwhen the port adapter (the ATM-OC3 POM network module) is subjected to OIR. This command is usedprincipally during the port adapter initialization phase.
debug atm oc3 pom sar command
Use the debugatmoc3pomsar command to display blocking commands or indications sent to or receivedfrom the SAR. This includes commands or indications of the creation or deletion of virtual circuits or virtualpaths.
debug atm oc3 pom sfp command
Use the debugatmoc3pomsfp command to display the indications generated when a module in the SFP portis subjected to OIR.
debug atm oc3 pom trace command
Use the debugatmoc3pomtrace command to display the hexadecimal representation of commands sent toor received from the SAR. To facilitate debugging, use this command in conjunction with thedebugatmoc3pomsar command.
Examples
Examples The following is sample output from the debugatmoc3pomdata command:
Router# debug atm oc3 pom dataDATA debugging is onRouter#*Jun 27 22:03:17.996: Packet Indication:*Jun 27 22:03:17.996: word 0: 0x00007D24*Jun 27 22:03:17.996: word 1: 0x00002F02*Jun 27 22:03:17.996: word 2: 0xEE323464*Jun 27 22:03:17.996: word 3: 0x006C006DThe table below describes the significant fields shown in the display.
Table 28: debug atm oc3 pom data Field Descriptions
DescriptionField
Date or time stamp of packet DMA transfer.Jun 27 22:03:17.996:
Hexadecimal representation of four-wordacknowledgment from the SAR when a packet istransferred by DMA to the host memory by the SAR.
word [0 - 3]: 0xXXXXXXXX
Cisco IOS Debug Command Reference - Commands A through D144
debug aaa accounting through debug auto-configdebug atm oc3 pom
Examples The following example illustrates the output from the debugatmoc3pomflow command:
Router# debug atm oc3 pom flowFLOW CNTL INDICATION debugging is onRouter#*Jun 27 15:14:13.123: Flow Indication:*Jun 27 15:14:13.123: word 0: 0x00000001*Jun 27 15:14:13.123: word 1: 0x300012C0*Jun 27 15:14:13.123: word 2: 0x18001060*Jun 27 15:14:13.123: word 3: 0x00080021*Jun 27 15:14:13.456: Flow Indication:*Jun 27 15:14:13.456: word 0: 0x00000001*Jun 27 15:14:13.456: word 1: 0x300012C0*Jun 27 15:14:13.456: word 2: 0x18001060*Jun 27 15:14:13.456: word 3: 0x00090022The table below describes the significant fields shown in the display.
Table 29: debug atm oc3 pom flow Field Descriptions
DescriptionField
Date or time stamp of flow indicationJun 27 15:14:13.456:
Hexadecimal representation of four-word indicationsent by the SAR to the host that a high watermark orlow watermark event has occurred.
word [0 - 3]: 0xXXXXXXXX
When XX is 08, a high watermark has been receivedby the host. The host will stop queueing packets forthe VC.
When XX is 09, a low watermark has been receivedby the host. The host will resume sending packets tothe VC.
YYYY is the running count of flow indication eventssent to the host.
word 3: 0x00XXYYYY
Examples The following examples illustrate the output from the debugatmoc3pompa command.
The first example gives the output when the network module is removed:
Router# debug atm oc3 pom paPA debugging is on*Jun 27 22:40:56.110: %OIR-6-REMCARD: Card removed from slot 2, interfaces disabled*Jun 27 22:40:56.122: *** Freed 6146 buffersThe second example gives the output when the network module is inserted, and gives the values of internalregisters of the module:
*Jun 27 22:41:08.654: %OIR-6-INSCARD: Card inserted in slot 2, interfaces administrativelyshut down*Jun 27 22:41:11.402: sar_base_addr 0x5C800000*Jun 27 22:41:11.402: PCI_MEMBAR2_REG after configuring:0x5E000008*Jun 27 22:41:11.402: PCI_MEMBAR3_REG after configuring:0x5F000000*Jun 27 22:41:11.402: PCI_COMMAND_REG: Offset= 0x4; value= 0x2A00006
Cisco IOS Debug Command Reference - Commands A through D 145
debug aaa accounting through debug auto-configdebug atm oc3 pom
*Jun 27 22:41:11.402: FPGA Base address is 0x5C900000*Jun 27 22:41:11.402: FPGA PCI config Reg is 0x02200002
Examples The following examples illustrate the output from the debugatmoc3pomsar command.
The first example displays command indications for setting up a VC and opening the reassembly channel andthe segmentation channel in the SAR:
Router# debug atm oc3 pom sarSAR debugging is onRouter# configure terminalRouter(config)# interface atm 2/0Router(config-if)# pvc 2/2Router(config-if-atm-vc)# exitRouter(config-if)#*Jun 27 22:12:28.816: ATM2/0: Setup_VC: vc:3 vpi:2 vci:2*Jun 27 22:12:28.816: ATM2/0: Open_Channel(RSY): CH (1), VPI (2), VCI (2)*Jun 27 22:12:28.816: ATM2/0: HI/LO watermarks: 526/263; PeakRate: 149760*Jun 27 22:12:28.816: ATM2/0: Open_Channel(SEG): CH (1), VPI (2), VCI (2)*Jun 27 22:12:28.820: ATM2/0: Setup_Cos: vc:3 wred_name:- max_q:0The second example displays the commands sent to the SAR and the acknowledgements returned when theVC is deleted and the segmentation and reassembly channels are closed:
Router(config-if)# no pvc 2/2Router(config-if)#*Jun 27 22:12:59.016: ATM2/0: Sent pending EOP successfully*Jun 27 22:12:59.016: ATM2/0: Close_Channel(RSY): Chan_ID (0x104)*Jun 27 22:12:59.016: ATM2/0: Close_Channel(RSY): Chan_ID (0x104) CLOSE*Jun 27 22:12:59.016: ATM2/0: Close_Channel: CLOSE_PENDING*Jun 27 22:12:59.016: ATM2/0: Close_Channel(SEG): Chan_ID (0x105)*Jun 27 22:12:59.016: ATM2/0: Close_Channel: CLOSE
Examples The following examples illustrate the output from the debugatmoc3pomsfp command.
The first example gives the output when the module is removed from the SFP port:
Router# debug atm oc3 pom sfpSFP debugging is on*Jun 27 22:27:40.792: SFP TX FAULT detected*Jun 27 22:27:40.808: SFP LOS detected*Jun 27 22:27:40.812: SFP removal detected*Jun 27 22:27:41.464: NM-1A-OC3-POM: SFP 2/0 - Removed unique*Jun 27 22:27:43.464: %LINK-3-UPDOWN: Interface ATM2/0, changed state to down*Jun 27 22:27:44.464: %LINEPROTO-5-UPDOWN: Line protocol on Interface ATM2/0, changed stateto downThe second example gives the output when the module is inserted in the SFP port.
*Jun 27 22:27:47.776: SFP LOS cleared*Jun 27 22:27:47.776: SFP TX FAULT detected*Jun 27 22:27:48.276: SFP present detected*Jun 27 22:27:48.276: SFP TX FAULT cleared*Jun 27 22:27:48.496: Set the Container_id to 17*Jun 27 22:27:50.496: %LINK-3-UPDOWN: Interface ATM2/0, changed state to up*Jun 27 22:27:51.496: %LINEPROTO-5-UPDOWN: Line protocol on Interface ATM2/0, changed stateto up
Examples The first example illustrates the output from the debugatmoc3pomtrace command when it is run withoutthe debugatmoc3sar command being activated:
Router# debug atm oc3 pom traceSAR CMD/ACK debugging is on
Cisco IOS Debug Command Reference - Commands A through D146
debug aaa accounting through debug auto-configdebug atm oc3 pom
Router# configure terminalRouter(config)# interface atm 2/0router(config-if)# pvc 2/2Router(config-if-atm-vc)# exitRouter(config-if)#*Jun 27 22:15:09.284: Command Sent:*Jun 27 22:15:09.284: word 0: 0x00000480*Jun 27 22:15:09.284: word 1: 0x00012010*Jun 27 22:15:09.284: word 2: 0x00000000*Jun 27 22:15:09.284: word 3: 0x00000000*Jun 27 22:15:09.284: word 4: 0x00200020*Jun 27 22:15:09.284: word 5: 0x00000000*Jun 27 22:15:09.284: word 6: 0x00000000*Jun 27 22:15:09.284: word 7: 0x00000000*Jun 27 22:15:09.284: word 8: 0x00000000*Jun 27 22:15:09.284: Command Indication:*Jun 27 22:15:09.284: word 0: 0x00000000*Jun 27 22:15:09.284: word 1: 0x01042110*Jun 27 22:15:09.284: word 2: 0x01050000*Jun 27 22:15:09.284: word 3: 0x0000003B*Jun 27 22:15:09.284: ACK received = 200 usecs*Jun 27 22:15:09.284: Command Sent:*Jun 27 22:15:09.284: word 0: 0x01050480*Jun 27 22:15:09.284: word 1: 0x00011010*Jun 27 22:15:09.284: word 2: 0x02000000*Jun 27 22:15:09.284: word 3: 0x00010003*Jun 27 22:15:09.284: word 4: 0x00200020*Jun 27 22:15:09.284: word 5: 0x64B30000*Jun 27 22:15:09.284: word 6: 0x10C00000*Jun 27 22:15:09.284: word 7: 0x86850000*Jun 27 22:15:09.284: word 8: 0x00010040*Jun 27 22:15:09.284: word 9: 0x00000000*Jun 27 22:15:09.284: Command Indication:*Jun 27 22:15:09.284: word 0: 0x00010000*Jun 27 22:15:09.284: word 1: 0x00011110*Jun 27 22:15:09.284: word 2: 0x02000000*Jun 27 22:15:09.284: word 3: 0x0001003D*Jun 27 22:15:09.284: ACK received = 200 usecs
The table below describes the significant fields shown in the display.
Table 30: debug atm oc3 pom trace Field Descriptions
DescriptionField
Date or time stamp for the command dialog.Jun 27 22:15:09.284:
Hexadecimal representation of the n-word commandsent to the SAR (under Command Sent:) and thefour-word acknowledgment returned by the SAR(under Command Indication:).
word [0 - n]: 0xXXXXXXXX
Time (in microseconds) between sending thecommand to the SAR and receiving theacknowledgment.
ACK received
The second example illustrates the output from the debugatmoc3pomtrace command run in conjunctionwith the debugatmoc3pomsar command.
Cisco IOS Debug Command Reference - Commands A through D 147
debug aaa accounting through debug auto-configdebug atm oc3 pom
In this example, each command sent to the SAR is displayed by the debugatmoc3pomsar command. Thenthe hexadecimal representation of the command and its acknowledgement are displayed by thedebugatmoc3pomtrace command.
Router# debug atm oc3 pom traceSAR CMD/ACK debugging is onRouter# debug atm oc3 pom sarSAR debugging is onRouter# configure terminalRouter(config)# interface atm 2/0router(config-if)# pvc 2/2Router(config-if-atm-vc)# exitRouter(config-if)#*Jun 27 22:15:09.284: ATM2/0: Setup_VC: vc:4 vpi:2 vci:2*Jun 27 22:15:09.284: ATM2/0: Open_Channel(RSY): CH (1), VPI (2), VCI (2)*Jun 27 22:15:09.284: Command Sent:*Jun 27 22:15:09.284: word 0: 0x00000480*Jun 27 22:15:09.284: word 1: 0x00012010*Jun 27 22:15:09.284: word 2: 0x00000000*Jun 27 22:15:09.284: word 3: 0x00000000*Jun 27 22:15:09.284: word 4: 0x00200020*Jun 27 22:15:09.284: word 5: 0x00000000*Jun 27 22:15:09.284: word 6: 0x00000000*Jun 27 22:15:09.284: word 7: 0x00000000*Jun 27 22:15:09.284: word 8: 0x00000000*Jun 27 22:15:09.284: Command Indication:*Jun 27 22:15:09.284: word 0: 0x00000000*Jun 27 22:15:09.284: word 1: 0x01042110*Jun 27 22:15:09.284: word 2: 0x01050000*Jun 27 22:15:09.284: word 3: 0x0000003B*Jun 27 22:15:09.284: ACK received = 200 usecs*Jun 27 22:15:09.284: ATM2/0: HI/LO watermarks: 526/263; PeakRate: 149760*Jun 27 22:15:09.284: ATM2/0: Open_Channel(SEG): CH (1), VPI (2), VCI (2)*Jun 27 22:15:09.284: Command Sent:*Jun 27 22:15:09.284: word 0: 0x01050480*Jun 27 22:15:09.284: word 1: 0x00011010*Jun 27 22:15:09.284: word 2: 0x02000000*Jun 27 22:15:09.284: word 3: 0x00010003*Jun 27 22:15:09.284: word 4: 0x00200020*Jun 27 22:15:09.284: word 5: 0x64B30000*Jun 27 22:15:09.284: word 6: 0x10C00000*Jun 27 22:15:09.284: word 7: 0x86850000*Jun 27 22:15:09.284: word 8: 0x00010040*Jun 27 22:15:09.284: word 9: 0x00000000*Jun 27 22:15:09.284: Command Indication:*Jun 27 22:15:09.284: word 0: 0x00010000*Jun 27 22:15:09.284: word 1: 0x00011110*Jun 27 22:15:09.284: word 2: 0x02000000*Jun 27 22:15:09.284: word 3: 0x0001003D*Jun 27 22:15:09.284: ACK received = 200 usecs*Jun 27 22:15:09.284: ATM2/0: Setup_Cos: vc:4 wred_name:- max_q:0
Cisco IOS Debug Command Reference - Commands A through D148
debug aaa accounting through debug auto-configdebug atm oc3 pom
debug atm t3e3To display debug messages for ATM T3/E3 network modules, use the debugatmt3e3 command in privilegedEXEC mode. To disable debugging output, use the no form of this command.
debug atm t3e3 {data| flow| pa| sar| trace}
no debug atm t3e3 {data| flow| pa| sar| trace}
Syntax Description Displays debug messages for incoming packetindications.
data
Displays debugmessages for flow control indications.flow
Displays debug messages for online insertion orremoval (OIR) of the ATM T3/E3 network module.
pa
Displays debug messages for blocking commandssent to the segmentation and reassembly (SAR) andtheir acknowledgments.
sar
Displays debug messages that give the hexadecimalrepresentation of commands sent to the SAR and theiracknowledgments.
trace
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.4(15)T
Usage Guidelines debug atm t3e3 data command
Use the debugatmt3e3data command to display the incoming packet indications. Each incoming packettransferred by direct memory access (DMA) to the host memory by the SAR will cause a packet indication.
debug atm t3e3 flow command
Use the debugatmt3e3flow command to display flow control indications.
When traffic sent to the SAR exceeds the peak cell rate for a particular virtual circuit (VC), the SAR indicatesthis to the host by sending flow control indications. These indications inform the host that either the highwatermark or the low watermark has been reached for that VC queue.
Cisco IOS Debug Command Reference - Commands A through D 149
debug aaa accounting through debug auto-configdebug atm t3e3
When a high watermark is received from the SAR, indicating that the VC queue is full, the host will stopsending packets to the SAR until a low watermark indication is received. A low watermark indicates that theVC queue has been drained sufficiently to receive additional packets.
debug atm t3e3 pa command
Use the debugatmt3e3pacommand on those platforms supporting OIR to display the indications generatedwhen the port adapter (the ATMT3/E3 networkmodule) is subjected to OIR. This command is used principallyduring the port adapter initialization phase.
debug atm t3e3 sar command
Use the debugatmt3e3sar command to display blocking commands or indications sent to or received fromthe SAR. This includes commands or indications of the creation or deletion of virtual circuits or virtual paths.
debug atm t3e3 trace command
Use the debugatmt3e3trace command to display the hexadecimal representation of commands sent to orreceived from the SAR. To facilitate debugging, use this command in conjunction with the debugatmt3e3sarcommand.
Examples
Examples The following is sample output from the debugatmt3e3data command:
Router# debug atm t3e3 dataDATA debugging is onRouter#*Jun 27 22:03:17.996: Packet Indication:*Jun 27 22:03:17.996: word 0: 0x00007D24*Jun 27 22:03:17.996: word 1: 0x00002F02*Jun 27 22:03:17.996: word 2: 0xEE323464*Jun 27 22:03:17.996: word 3: 0x006C006DThe table below describes the significant fields shown in the display.
Table 31: debug atm t3e3 data Field Descriptions
DescriptionField
Date or time stamp of packet DMA transfer.Jun 27 22:03:17.996:
Hexadecimal representation of four-wordacknowledgment from the SAR when a packet istransferred by DMA to the host memory by the SAR.
word [0 - 3]: 0xXXXXXXXX
Examples The following example illustrates the output from the debugatmt3e3flow command:
Router# debug atm t3e3 flowFLOW CNTL INDICATION debugging is onRouter#*Jun 27 15:14:13.123: Flow Indication:*Jun 27 15:14:13.123: word 0: 0x00000001*Jun 27 15:14:13.123: word 1: 0x300012C0*Jun 27 15:14:13.123: word 2: 0x18001060*Jun 27 15:14:13.123: word 3: 0x00080021*Jun 27 15:14:13.456: Flow Indication:*Jun 27 15:14:13.456: word 0: 0x00000001
Cisco IOS Debug Command Reference - Commands A through D150
debug aaa accounting through debug auto-configdebug atm t3e3
*Jun 27 15:14:13.456: word 1: 0x300012C0*Jun 27 15:14:13.456: word 2: 0x18001060*Jun 27 15:14:13.456: word 3: 0x00090022The table below describes the significant fields shown in the display.
Table 32: debug atm t3e3 flow Field Descriptions
DescriptionField
Date or time stamp of flow indicationJun 27 15:14:13.456:
Hexadecimal representation of four-word indicationsent by the SAR to the host that a high watermark orlow watermark event has occurred.
word [0 - 3]: 0xXXXXXXXX
When XX is 08, a high watermark has been receivedby the host. The host will stop queueing packets forthe VC.
When XX is 09, a low watermark has been receivedby the host. The host will resume sending packets tothe VC.
YYYY is the running count of flow indication eventssent to the host.
word 3: 0x00XXYYYY
Examples The following examples illustrate the output from the debugatmt3e3pa command.
The first example gives the output when the network module is removed:
Router# debug atm t3e3 paPA debugging is on*Jun 27 22:40:56.110: %OIR-6-REMCARD: Card removed from slot 2, interfaces disabled*Jun 27 22:40:56.122: *** Freed 6146 buffersThe second example gives the output when the network module is inserted, and gives the values of internalregisters of the module:
*Jun 27 22:41:08.654: %OIR-6-INSCARD: Card inserted in slot 2, interfaces administrativelyshut down*Jun 27 22:41:11.402: sar_base_addr 0x5C800000*Jun 27 22:41:11.402: PCI_MEMBAR2_REG after configuring:0x5E000008*Jun 27 22:41:11.402: PCI_MEMBAR3_REG after configuring:0x5F000000*Jun 27 22:41:11.402: PCI_COMMAND_REG: Offset= 0x4; value= 0x2A00006*Jun 27 22:41:11.402: FPGA Base address is 0x5C900000*Jun 27 22:41:11.402: FPGA PCI config Reg is 0x02200002
Examples The following examples illustrate the output from the debugatmt3e3sar command.
The first example displays command indications for setting up a VC and opening the reassembly channel andthe segmentation channel in the SAR:
Router# debug atm t3e3 sarSAR debugging is onRouter# configure terminalRouter(config)# interface atm 2/0Router(config-if)# pvc 2/2
Cisco IOS Debug Command Reference - Commands A through D 151
debug aaa accounting through debug auto-configdebug atm t3e3
Router(config-if-atm-vc)# exitRouter(config-if)#*Jun 27 22:12:28.816: ATM2/0: Setup_VC: vc:3 vpi:2 vci:2*Jun 27 22:12:28.816: ATM2/0: Open_Channel(RSY): CH (1), VPI (2), VCI (2)*Jun 27 22:12:28.816: ATM2/0: HI/LO watermarks: 526/263; PeakRate: 149760*Jun 27 22:12:28.816: ATM2/0: Open_Channel(SEG): CH (1), VPI (2), VCI (2)*Jun 27 22:12:28.820: ATM2/0: Setup_Cos: vc:3 wred_name:- max_q:0The second example displays the commands sent to the SAR and the acknowledgements returned when theVC is deleted and the segmentation and reassembly channels are closed:
Router(config-if)# no pvc 2/2Router(config-if)#*Jun 27 22:12:59.016: ATM2/0: Sent pending EOP successfully*Jun 27 22:12:59.016: ATM2/0: Close_Channel(RSY): Chan_ID (0x104)*Jun 27 22:12:59.016: ATM2/0: Close_Channel(RSY): Chan_ID (0x104) CLOSE*Jun 27 22:12:59.016: ATM2/0: Close_Channel: CLOSE_PENDING*Jun 27 22:12:59.016: ATM2/0: Close_Channel(SEG): Chan_ID (0x105)*Jun 27 22:12:59.016: ATM2/0: Close_Channel: CLOSE
Examples The first example illustrates the output from the debugatmt3e3trace command when it is run without thedebugatmt3e3sar command being activated:
Router# debug atm t3e3 traceSAR CMD/ACK debugging is onRouter# configure terminalRouter(config)# interface atm 2/0router(config-if)# pvc 2/2Router(config-if-atm-vc)# exitRouter(config-if)#*Jun 27 22:15:09.284: Command Sent:*Jun 27 22:15:09.284: word 0: 0x00000480*Jun 27 22:15:09.284: word 1: 0x00012010*Jun 27 22:15:09.284: word 2: 0x00000000*Jun 27 22:15:09.284: word 3: 0x00000000*Jun 27 22:15:09.284: word 4: 0x00200020*Jun 27 22:15:09.284: word 5: 0x00000000*Jun 27 22:15:09.284: word 6: 0x00000000*Jun 27 22:15:09.284: word 7: 0x00000000*Jun 27 22:15:09.284: word 8: 0x00000000*Jun 27 22:15:09.284: Command Indication:*Jun 27 22:15:09.284: word 0: 0x00000000*Jun 27 22:15:09.284: word 1: 0x01042110*Jun 27 22:15:09.284: word 2: 0x01050000*Jun 27 22:15:09.284: word 3: 0x0000003B*Jun 27 22:15:09.284: ACK received = 200 usecs*Jun 27 22:15:09.284: Command Sent:*Jun 27 22:15:09.284: word 0: 0x01050480*Jun 27 22:15:09.284: word 1: 0x00011010*Jun 27 22:15:09.284: word 2: 0x02000000*Jun 27 22:15:09.284: word 3: 0x00010003*Jun 27 22:15:09.284: word 4: 0x00200020*Jun 27 22:15:09.284: word 5: 0x64B30000*Jun 27 22:15:09.284: word 6: 0x10C00000*Jun 27 22:15:09.284: word 7: 0x86850000*Jun 27 22:15:09.284: word 8: 0x00010040*Jun 27 22:15:09.284: word 9: 0x00000000*Jun 27 22:15:09.284: Command Indication:*Jun 27 22:15:09.284: word 0: 0x00010000*Jun 27 22:15:09.284: word 1: 0x00011110*Jun 27 22:15:09.284: word 2: 0x02000000*Jun 27 22:15:09.284: word 3: 0x0001003D*Jun 27 22:15:09.284: ACK received = 200 usecs
The table below describes the significant fields shown in the display.
Cisco IOS Debug Command Reference - Commands A through D152
debug aaa accounting through debug auto-configdebug atm t3e3
Table 33: debug atm t3e3 trace Field Descriptions
DescriptionField
Date or time stamp for the command dialog.Jun 27 22:15:09.284:
Hexadecimal representation of the n-word commandsent to the SAR (under Command Sent:) and thefour-word acknowledgment returned by the SAR(under Command Indication:).
word [0 - n]: 0xXXXXXXXX
Time (in microseconds) between sending thecommand to the SAR and receiving theacknowledgment.
ACK received
The second example illustrates the output from the debugatmt3e3trace command run in conjunction withthe debugatmt3e3sar command.
In this example, each command sent to the SAR is displayed by the debugatmt3e3sar command. Then thehexadecimal representation of the command and its acknowledgement are displayed by the debugatmt3e3tracecommand.
Router# debug atm t3e3 traceSAR CMD/ACK debugging is onRouter# debug atm t3e3 sarSAR debugging is onRouter# configure terminalRouter(config)# interface atm 2/0router(config-if)# pvc 2/2Router(config-if-atm-vc)# exitRouter(config-if)#*Jun 27 22:15:09.284: ATM2/0: Setup_VC: vc:4 vpi:2 vci:2*Jun 27 22:15:09.284: ATM2/0: Open_Channel(RSY): CH (1), VPI (2), VCI (2)*Jun 27 22:15:09.284: Command Sent:*Jun 27 22:15:09.284: word 0: 0x00000480*Jun 27 22:15:09.284: word 1: 0x00012010*Jun 27 22:15:09.284: word 2: 0x00000000*Jun 27 22:15:09.284: word 3: 0x00000000*Jun 27 22:15:09.284: word 4: 0x00200020*Jun 27 22:15:09.284: word 5: 0x00000000*Jun 27 22:15:09.284: word 6: 0x00000000*Jun 27 22:15:09.284: word 7: 0x00000000*Jun 27 22:15:09.284: word 8: 0x00000000*Jun 27 22:15:09.284: Command Indication:*Jun 27 22:15:09.284: word 0: 0x00000000*Jun 27 22:15:09.284: word 1: 0x01042110*Jun 27 22:15:09.284: word 2: 0x01050000*Jun 27 22:15:09.284: word 3: 0x0000003B*Jun 27 22:15:09.284: ACK received = 200 usecs*Jun 27 22:15:09.284: ATM2/0: HI/LO watermarks: 526/263; PeakRate: 149760*Jun 27 22:15:09.284: ATM2/0: Open_Channel(SEG): CH (1), VPI (2), VCI (2)*Jun 27 22:15:09.284: Command Sent:*Jun 27 22:15:09.284: word 0: 0x01050480*Jun 27 22:15:09.284: word 1: 0x00011010*Jun 27 22:15:09.284: word 2: 0x02000000*Jun 27 22:15:09.284: word 3: 0x00010003*Jun 27 22:15:09.284: word 4: 0x00200020*Jun 27 22:15:09.284: word 5: 0x64B30000*Jun 27 22:15:09.284: word 6: 0x10C00000*Jun 27 22:15:09.284: word 7: 0x86850000*Jun 27 22:15:09.284: word 8: 0x00010040*Jun 27 22:15:09.284: word 9: 0x00000000
Cisco IOS Debug Command Reference - Commands A through D 153
debug aaa accounting through debug auto-configdebug atm t3e3
*Jun 27 22:15:09.284: Command Indication:*Jun 27 22:15:09.284: word 0: 0x00010000*Jun 27 22:15:09.284: word 1: 0x00011110*Jun 27 22:15:09.284: word 2: 0x02000000*Jun 27 22:15:09.284: word 3: 0x0001003D*Jun 27 22:15:09.284: ACK received = 200 usecs*Jun 27 22:15:09.284: ATM2/0: Setup_Cos: vc:4 wred_name:- max_q:0
Cisco IOS Debug Command Reference - Commands A through D154
debug aaa accounting through debug auto-configdebug atm t3e3
debug auditTo display debug messages for the audit subsystem, use the debugauditcommand in privileged EXEC mode.To disable debugging for the audit subsystem, use the no form of this command.
debug audit
no debug audit
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(18)S
This feature was integrated into Cisco IOS Release 12.0(27)S.12.0(27)S
This command was integrated into Cisco IOS Release 12.2(27)SBC.12.2(27)SBC
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines Audit files allow you to track changes that have been made to your router. Each change is logged as a syslogmessage, and all syslog messages are kept in the audit file, which is kept in the audit subsystem.
Examples The following example is sample output from the debugauditcommand:
Router# debug audit
*Sep 14 18:37:31.535:disk0:/forensics.log -> File not found*Sep 14 18:37:31.535:%AUDIT-1-RUN_VERSION:Hash:24D98B13B87D106E7E6A7E5D1B3CE0AD User:*Sep 14 18:37:31.583:%AUDIT-1-RUN_CONFIG:Hash:4AC2D776AA6FCA8FD7653CEB8969B695 User:*Sep 14 18:37:31.587:Audit:Trying to hash nvram:startup-config*Sep 14 18:37:31.587:Audit:nvram:startup-config Done.*Sep 14 18:37:31.587:Audit:Trying to hash nvram:private-config*Sep 14 18:37:31.591:Audit:nvram:private-config Done.*Sep 14 18:37:31.591:Audit:Trying to hash nvram:underlying-config*Sep 14 18:37:31.591:Audit:nvram:underlying-config Done.*Sep 14 18:37:31.591:Audit:Trying to hash nvram:persistent-data*Sep 14 18:37:31.591:Audit:nvram:persistent-data Done.*Sep 14 18:37:31.595:Audit:Trying to hash nvram:ifIndex-table*Sep 14 18:37:31.595:Audit:Skipping nvram:ifIndex-table*Sep 14 18:37:31.595:%AUDIT-1-STARTUP_CONFIG:Hash:95DD497B1BB61AB33A629124CBFEC0FC User:*Sep 14 18:37:31.595:Audit:Trying to hash filesystem disk0:*Sep 14 18:37:31.775:Audit:Trying to hash attributes ofdisk0:c7200-p-mz.120-23.S*Sep 14 18:37:32.103:Audit:disk0:c7200-p-mz.120-23.S DONE
Cisco IOS Debug Command Reference - Commands A through D 155
debug aaa accounting through debug auto-configdebug audit
*Sep 14 18:37:32.103:Audit:disk0:DONE*Sep 14 18:37:32.103:Audit:Trying to hash filesystem bootflash:*Sep 14 18:37:32.103:Audit:Trying to hash attributes ofbootflash:c7200-kboot-mz.121-8a.E*Sep 14 18:37:32.107:Audit:bootflash:c7200-kboot-mz.121-8a.E DONE*Sep 14 18:37:32.107:Audit:Trying to hash attributes ofbootflash:crashinfo_20030115-182547*Sep 14 18:37:32.107:Audit:bootflash:crashinfo_20030115-182547 DONE*Sep 14 18:37:32.107:Audit:Trying to hash attributes ofbootflash:crashinfo_20030115-212157*Sep 14 18:37:32.107:Audit:bootflash:crashinfo_20030115-212157 DONE*Sep 14 18:37:32.107:Audit:Trying to hash attributes ofbootflash:crashinfo_20030603-155534*Sep 14 18:37:32.107:Audit:bootflash:crashinfo_20030603-155534 DONE*Sep 14 18:37:32.107:Audit:bootflash:DONE*Sep 14 18:37:32.107:%AUDIT-1-FILESYSTEM:Hash:330E7111F2B526F0B850C24ED5774EDE User:*Sep 14 18:37:32.107:Audit:Hashing entitymib entry for 7206VXR chassis,Hw Serial#:28710795, Hw Revision:A*Sep 14 18:37:32.107:Audit:Hashing entitymib entry for NPE 400 Card, HwSerial#:28710795, Hw Revision:A*Sep 14 18:37:32.107:Audit:Hashing entitymib entry for Chassis Slot*Sep 14 18:37:32.107:Audit:Hashing entitymib entry for I/O DualFastEthernet Controller*Sep 14 18:37:32.107:Audit:Hashing entitymib entry for i82543(Livengood)*Sep 14 18:37:32.107:Audit:Hashing entitymib entry for i82543(Livengood)*Sep 14 18:37:32.107:Audit:Hashing entitymib entry for Chassis Slot*Sep 14 18:37:32.107:Audit:Hashing entitymib entry for Chassis Slot*Sep 14 18:37:32.107:Audit:Hashing entitymib entry for Chassis Slot*Sep 14 18:37:32.107:Audit:Hashing entitymib entry for Chassis Slot*Sep 14 18:37:32.107:Audit:Hashing entitymib entry for Chassis Slot*Sep 14 18:37:32.107:Audit:Hashing entitymib entry for Chassis Slot*Sep 14 18:37:32.107:%AUDIT-1-HARDWARE_CONFIG:Hash:32F66463DDA802CC9171AF6386663D20 User:
Related Commands DescriptionCommand
Changes the size of the audit file.audit filesize
Changes the time interval that is used for calculatinghashes.
audit interval
Cisco IOS Debug Command Reference - Commands A through D156
debug aaa accounting through debug auto-configdebug audit
debug authenticationTo display debugging information about the AuthenticationManager, use the debugauthentication commandin privileged EXEC mode. To disable debugging output, use the no form of this command.
debug authentication {[feature feature-name]| {all| detail| errors| events| sync}}
no debug authentication {[feature feature-name]| {all| detail| errors| events| sync}}
Syntax Description Displays debugging information about specificfeatures. To display the valid feature names, use thequestion mark (?) online help function.
feature feature-name
Displays all debugging information about theAuthentication Manager and all features.
all
Displays detailed debugging information.detail
Displays debugging information about AuthenticationManager errors.
errors
Displays debugging information about AuthenticationManager events.
events
Displays debugging information about AuthenticationManager stateful switchovers (SSOs) or In ServiceSoftware Upgrades (ISSUs).
sync
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SXI
This command was integrated into Cisco IOS Release 15.2(2)T.15.2(2)T
This command was modified. The detail keyword was added.Cisco IOS XE Release 3.2SE
Usage Guidelines Use the debug authentication command to troubleshoot the Authentication Manager.
Cisco IOS Debug Command Reference - Commands A through D 157
debug aaa accounting through debug auto-configdebug authentication
Examples The following example shows sample output from the debug authentication command when the featureand events keywords are configured:
Device# debug authentication feature mda eventsAuth Manager mda events debugging is on
Related Commands DescriptionCommand
Displays debugging information about Session AwareNetworking sessions.
debug access-session
Displays 802.1x debugging information.debug dot1x
Cisco IOS Debug Command Reference - Commands A through D158
debug aaa accounting through debug auto-configdebug authentication
debug auto-configTo enable debugging for autoconfiguration applications, use the debugauto-config command in privilegedEXEC mode. To disable debugging output, use the no form of this command.
debug auto-config {all| errors| events| parser}
no debug auto-config {all| errors| events| parser}
Syntax Description Displays all autoconfiguration debug trace.all
Displays autoconfiguration errors.errors
Displays autoconfiguration events.events
Displays autoconfiguration parser.parser
Command Default Disabled
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced on the Communication Media Module.12.3(8)XY
This command was integrated into Cisco IOS Release 12.3(14)T.12.3(14)T
This command was integrated into Cisco IOS Release 12.4(3).12.4(3)
Examples The following example shows the debugauto-config command used to enable debugging for autoconfigurationapplications and to display autoconfiguration events:
Router# debug auto-config events...Feb 8 02:17:31.119: dnld_app_check_state(0x628C8164)...Feb 8 02:17:31.123: dnld_chk_app_handle(0x628C8164)Feb 8 02:17:31.123: dnld_app_check_state: appl = 0x628C8164, state = 0x11...The table below describes significant fields shown in the display.
Cisco IOS Debug Command Reference - Commands A through D 159
debug aaa accounting through debug auto-configdebug auto-config
Table 34: debug auto-config Field Descriptions
DescriptionField
Identifies the application handle, an auto-generatednumber for debugging.
0x628C8164
Displays the state of the application. State values areas follows:
0x11--Registered and enabled.
0x1--Download application enabled.
0x10--Download application registered.
0x11
Related Commands DescriptionCommand
Enables autoconfiguration or enters auto-configapplication configuration mode for the SCCPapplication.
auto-config
Enables SCCP event debugging.debug sccp config
Displays the current status of autoconfigurationapplications.
show auto-config
Cisco IOS Debug Command Reference - Commands A through D160
debug aaa accounting through debug auto-configdebug auto-config
debug auto-ip-ringTo display debugging information about a device in an auto-IP ring, use the debug auto-ip-ring commandin privileged EXEC mode. To disable the debugging output, use the no form of this command.
debug auto-ip-ring {ring-id {errors | events} | errors | events}
no debug auto-ip-ring {ring-id {errors | events} | errors | events}
Syntax Description Auto-IP ring identification number.ring-id
Enables debugging output for auto-IP ring errors.errors
Enables debugging output for auto-IP ring events.events
Command Default Auto-IP ring debugging is disabled.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.Cisco IOS XE Release 3.10S
This command was integrated into Cisco IOS Release15.3(3)S15.3(3)S
Usage Guidelines To display debugging output for errors or events on all the auto-IP-enabled node interfaces for a device, usethe debug auto-ip-ring command without the ring-id argument.
To display debugging output for errors or events for a specific auto-IP ring, use the debug auto-ip-ringcommand with the ring-id argument
Examples The following is sample output for the debug auto-ip-ring command:
Device> enableDevice# debug auto-ip-ring 1 errors
Auto IP Ring errors debugging is on for the ring id : 1
*Jul 26 11:30:40.541: (Ethernet0/0) priority (value:1) conflict detected,need admin intervention
Cisco IOS Debug Command Reference - Commands A through D 161
debug aaa accounting through debug auto-configdebug auto-ip-ring
A conflict is detected in this example because the auto-IP TLV priority that is sent from the device andthe priority that is received from the neighbor device is the same.
Note
Related Commands DescriptionCommand
Enables the auto-IP functionality on the interfaces ofa device.
auto-ip-ring
Displays auto-IP ring information.show auto-ip-ring
Cisco IOS Debug Command Reference - Commands A through D162
debug aaa accounting through debug auto-configdebug auto-ip-ring
debug autoupgradeTo display the debug output of the Cisco Auto-Upgrade Manager (AUM), use the debug autoupgradecommand in privileged EXEC mode. To disable debug output, use the no form of this command.
debug autoupgrade
no debug autoupgrade
Syntax Description This command has no arguments or keywords.
Command Default The debug output is disabled.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.4(15)T
This command was integrated into Cisco IOS XE Release 3.9S.Cisco IOS XE Release 3.9S
Usage Guidelines Use the debug autoupgrade command when you encounter a problem with AUM and provide the output toTAC. Run the debug autoupgrade command and then run AUM to view the debug messages.
Examples The following example shows how to enable the debugging of Cisco Auto-Upgrade Manager:
Device# debug autoupgradeAuto Upgrade Manager debugging ONDevice#Device# upgrade automatic getversion tftp://10.1.0.1/username/aaa
Image not found.Device#Jun 14 14:23:08.251 IST: AUM: Currently running software:flash:c3825-adventerprisek9-mz.CALVIN_AUM_EFT1
Jun 14 14:23:08.251 IST: AUM: Reload type:2 hour:0 min:0
Jun 14 14:23:08.251 IST: AUM: Disk management: 1Jun 14 14:23:08.251 IST: AUM: Get image tftp://10.1.0.1/username/aaa from local server andupgrade:Jun 14 14:23:08.251 IST: AUM: Extracted image name: aaaJun 14 14:23:08.339 IST: AUM: get image info: failed to open urlJun 14 14:23:08.339 IST: AUM: get image info: image size unknown
Cisco IOS Debug Command Reference - Commands A through D 163
debug aaa accounting through debug auto-configdebug autoupgrade
Related Commands DescriptionCommand
Downloads a Cisco software image directly fromwww.cisco.com or from a non-Cisco server.
upgrade automatic getversion
Cisco IOS Debug Command Reference - Commands A through D164
debug aaa accounting through debug auto-configdebug autoupgrade
debug backhaul-session-manager sessionthrough debug channel packets
• debug backhaul-session-manager session through debug channel packets, page 165
debug backhaul-session-manager session through debugchannel packets
Cisco IOS Debug Command Reference - Commands A through D 165
debug backhaul-session-manager sessionTo debug all the available sessions or a specified session, use the debugbackhaul-session-managersessioncommand in privileged EXEC mode. To disable debugging output, use the noform of this command.
debug backhaul-session-manager session {state| xport} {all| session-id}
no debug backhaul-session-manager session {state| xport} {all| session-id}
Syntax Description Shows information about state transitions. Possiblestates are as follows:
SESS_SET_IDLE: A session-set has been created.
SESS_SET_OOS: A session(s) has been added tosession-group(s). No ACTIVE notification has beenreceived from Virtual Switch Controller (VSC).
SESS_SET_ACTIVE_IS: An ACTIVE notificationhas been received over one in-service session-group.STANDBY notification has not been received on anyavailable session-group(s).
SESS_SET_STNDBY_IS:A STANDBYnotificationis received, but there is no in-service activesession-group available.
SESS_SET_FULL_IS: A session-group in-servicethat has ACTIVE notification and at least onesession-group in-service that has STANDBYnotification.
SESS_SET_SWITCH_OVER: An ACTIVEnotification is received on session-group in-service,which had received STANDBY notification.
state
Provides traces for all packets (protocol data units(PDUs)), application PDUs, and also session-managermessages.
xport
All available sessions.all
A specified session.session-id
Command Default Debugging for backhaul-session-manager session is not enabled.
Command Modes Privileged EXEC
Cisco IOS Debug Command Reference - Commands A through D166
debug backhaul-session-manager session through debug channel packetsdebug backhaul-session-manager session
Command History ModificationRelease
This command was introduced.12.1(1)T
Support for this command was introduced on the Cisco 7200 series routers.12.2(2)T
This command was implemented on the Cisco 2600 series, Cisco 3600 series,and Cisco MC3810.
12.2(4)T
This command was implemented on the Cisco AS5350 and Cisco AS5400.12.2(2)XB
This command was implemented on the Cisco AS5850 platform.12.2(2)XB1
This command was implemented on Cisco IAD2420 series integrated accessdevices (IADs). This command is not supported on the access servers in thisrelease.
12.2(8)T
This commandwas implemented on CiscoAS5350, Cisco AS5400, and CiscoAS5850 platforms.
12.2(11)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Examples The following is output for the debugbackhaul-session-managersessionallcommand:
Router# debug backhaul-session-manager session allRouter# debug_bsm_command:DEBUG_BSM_SESSION_ALL23:49:14:SESSION:XPORT:sig rcvd. session = 34, connid = 0x80BA12FC, sig = 5 (CONN-RESET)23:49:14:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:CLOSE23:49:14:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS23:49:14:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:OPEN_WAIT23:49:14:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS23:49:19:SESSION:XPORT:sig rcvd. session = 34, connid = 0x80BA12FC, sig = 5 (CONN-RESET)23:49:19:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:CLOSE23:49:19:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS23:49:19:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:OPEN_WAIT23:49:19:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS23:49:24:SESSION:XPORT:sig rcvd. session = 34, connid = 0x80BA12FC, sig = 5 (CONN-RESET)23:49:24:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:CLOSE23:49:24:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS23:49:24:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:OPEN_WAIT23:49:24:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS23:49:29:SESSION:XPORT:sig rcvd. session = 34, connid = 0x80BA12FC, sig = 5 (CONN-RESET)23:49:29:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:CLOSE23:49:29:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS23:49:29:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:OPEN_WAIT23:49:29:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS23:49:34:SESSION:XPORT:sig rcvd. session = 34, connid = 0x80BA12FC, sig = 5 (CONN-RESET)23:49:34:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:CLOSE23:49:34:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS23:49:34:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:OPEN_WAIT23:49:34:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS23:49:34:SESSION:XPORT:sig rcvd. session = 33, connid = 0x80BA14EC, sig = 1 (CONN-FAILED)23:49:34:SESSION:STATE:(33) old-state:OPEN, new-state:CLOSE_WAITThe following example displays output for the debugbackhaul-session-managersessionstateall command:
Router# debug backhaul-session-manager session state all
Cisco IOS Debug Command Reference - Commands A through D 167
debug backhaul-session-manager session through debug channel packetsdebug backhaul-session-manager session
Router# debug_bsm_command:DEBUG_BSM_SESSION_STATE_ALL23:50:54:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:CLOSE23:50:54:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOS23:50:54:SESSION:STATE:(34) old-state:OPEN_WAIT, new-state:OPEN_WAIT23:50:54:SESSION:STATE:(34) state:OPEN_WAIT, use-state:OOSThe following example displays output for the debugbackhaul-session-managersessionxportall command:
Router# debug backhaul-session-manager session xport all Router#debug_bsm_command:DEBUG_BSM_SESSION_XPORT23:51:39:SESSION:XPORT:sig rcvd. session = 34, connid = 0x80BA12FC, sig = 5 (CONN-RESET)23:51:42:SESSION:XPORT:sig rcvd. session = 33, connid = 0x80BA14EC, sig = 5 (CONN-RESET)23:51:44:SESSION:XPORT:sig rcvd. session = 34, connid = 0x80BA12FC, sig = 5 (CONN-RESET)
Related Commands
Use caution when enabling this debug command in a live system. It produces significant amounts ofoutput, which could lead to a disruption of service.
Caution
DescriptionCommand
Traces state changes and receives messages andevents for all available session-sets or a specifiedsession-set.
debug backhaul-session-manager set
Cisco IOS Debug Command Reference - Commands A through D168
debug backhaul-session-manager session through debug channel packetsdebug backhaul-session-manager session
debug backhaul-session-manager setTo trace state changes and receive messages and events for all the available session sets or a specified sessionset, use the debugbackhaul-session-managerset command in privileged EXECmode. To disable debuggingoutput, use the noform of this command.
debug backhaul-session-manager set {all| name set-name}
no debug backhaul-session-manager set {all| name set-name}
Syntax Description All available session sets.all
A specified session set.name set-name
Command Default Debugging for backhaul session sets is not enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.1(1)T
Support for this command was introduced on the Cisco 7200 series routers.12.2(2)T
This command was implemented on the Cisco 2600 series, Cisco 3600 series,and Cisco MC3810.
12.2(4)T
This command was implemented on the Cisco AS5350 and Cisco AS5400.12.2(2)XB
This command was implemented on the Cisco AS5850 platform.12.2(2)XB1
This command was implemented on Cisco IAD2420 series integrated accessdevices (IADs). This command is not supported on the access servers in thisrelease.
12.2(8)T
This commandwas implemented on Cisco AS5350, Cisco AS5400, and CiscoAS5850 platforms.
12.2(11)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Cisco IOS Debug Command Reference - Commands A through D 169
debug backhaul-session-manager session through debug channel packetsdebug backhaul-session-manager set
Examples The following is output for the debugbackhaul-session-managersetcommand for all available session sets:
Router# debug backhaul-session-manager set allRouter# debug_bsm_command:DEBUG_BSM_SET_ALLFunction set_proc_event() is calledSession-Set :test-setOld State :BSM_SET_OOSNew State :BSM_SET_OOS
Active-Grp :NONESession-Grp :g-11Old State :Group-NoneNew State :Group-NoneEvent rcvd :EVT_GRP_INS
BSM:Event BSM_SET_UP is sent to userSession-Set :test-setOld State :BSM_SET_OOSNew State :BSM_SET_ACTIVE_IS
Active-Grp :g-11Session-Grp :g-11Old State :Group-NoneNew State :Group-ActiveEvent rcvd :BSM_ACTIVE_TYPE
The following is output for the debugbackhaul-session-managersetnameset1command:
Router# debug backhaul-session-manager set name set1Router# debug_bsm_command:DEBUG_BSM_SET_NAMERouter# Function set_proc_event() is calledSession-Set :test-setOld State :BSM_SET_OOSNew State :BSM_SET_OOS
Active-Grp :NONESession-Grp :g-11Old State :Group-NoneNew State :Group-NoneEvent rcvd :EVT_GRP_INS
Router#BSM:Event BSM_SET_UP is sent to userSession-Set :test-setOld State :BSM_SET_OOSNew State :BSM_SET_ACTIVE_IS
Active-Grp :g-11Session-Grp :g-11Old State :Group-NoneNew State :Group-ActiveEvent rcvd :BSM_ACTIVE_TYPE
Related Commands DescriptionCommand
Debugs all available sessions or a specified session.debug backhaul-session-manager session
Cisco IOS Debug Command Reference - Commands A through D170
debug backhaul-session-manager session through debug channel packetsdebug backhaul-session-manager set
debug backupTo monitor the transitions of an interface going down then back up, use the debugbackupcommand inprivileged EXEC mode. To disable debugging output, use the no form of this command.
debug backup
no debug backup
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.0
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines The debugbackupcommand is useful for monitoring dual X.25 interfaces configured as primary and backupin a Telco data communication network (DCN).
Examples The following example shows how to start the debugbackup command:
Router# debug backup
Related Commands DescriptionCommand
Activates primary and backup lines on specific X.25interfaces.
backup active interface
Displays interface backup status.show backup
Cisco IOS Debug Command Reference - Commands A through D 171
debug backhaul-session-manager session through debug channel packetsdebug backup
debug bertTo display information on the bit error rate testing (BERT) feature, use the debugbert command in privilegedEXEC mode. To disable debugging output, use the noform of this command.
debug bert
no debug bert
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.0(2)XD
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines The debugbert command output is used primarily by Cisco technical support representatives. The debugbertcommand displays debugging messages for specific areas of executed code.
Examples The following is output from the debugbert command:
Router# debug bertBit Error Rate Testing debugging is onRouter# no debug bertBit Error Rate Testing debugging is off
Related Commands DescriptionCommand
Aborts a bit error rate testing session.bert abort
Starts a bit error rate test for a particular port on aCisco AS5300 router.
bert controller
Sets up various bit error rate testing profiles.bert profile
Cisco IOS Debug Command Reference - Commands A through D172
debug backhaul-session-manager session through debug channel packetsdebug bert
debug bfdTo display debuggingmessages about Bidirectional Forwarding Detection (BFD), use the debug bfd commandin privileged EXEC mode. To disable debugging output, use the no form of this command.
Cisco IOS Release 12.2(18)SXE, 12.4(4)T, and 12.2(33)SRA
debug bfd {event| packet [ip-address| ipv6-address]}
no debug bfd {event| packet [ip-address| ipv6-address]}
Cisco IOS Release 12.0(31)S
debug bfd {event| packet [ ip-address ]| ipc-error| ipc-event| oir-error| oir-event}
no debug bfd {event| packet [ ip-address ]| ipc-error| ipc-event| oir-error| oir-event}
Syntax Description Displays debugging information about BFD statetransitions.
event
Displays debugging information about BFD controlpackets.
packet
(Optional) Displays debugging information aboutBFD only for the specified IP address.
ip-address
(Optional) Displays debugging information aboutBFD only for the specified IPv6 address.
ipv6-address
(Optional) Displays debugging information withinterprocess communication (IPC) errors on the RouteProcessor (RP) and line card (LC).
ipc-error
(Optional) Displays debugging information with IPCevents on the RP and LC.
ipc-event
(Optional) Displays debugging information withonline insertion and removal (OIR) errors on the RPand LC.
oir-error
(Optional) Displays debugging information with OIRevents on the RP and LC.
oir-event
Command Modes Privileged EXEC
Cisco IOS Debug Command Reference - Commands A through D 173
debug backhaul-session-manager session through debug channel packetsdebug bfd
Command History ModificationRelease
This command was introduced.12.2(18)SXE
This command was integrated into Cisco IOS Release 12.0(31)S.12.0(31)S
This command was integrated into Cisco IOS Release 12.4(4)T.12.4(4)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
This command was modified. Support for IPv6 was added.12.2(33)SRE
This command was modified. Support for IPv6 was added to Cisco IOSRelease 15.1(2)T.
15.1(2)T
This command was integrated into Cisco IOS Release 15.1(1)SG.15.1(1)SG
This command was modified. Support for IPv6 was added to Cisco IOSRelease 15.1(1)SY.
15.1(1)SY
Usage Guidelines The debug bfd command can be used to troubleshoot the BFD feature.
Because BFD is designed to send and receive packets at a very high rate of speed, consider the potentialeffect on system resources before enabling this command, especially if there are a large number of BFDpeers. The debug bfd packet command should be enabled only on a live network at the direction of CiscoTechnical Assistance Center personnel.
Note
Examples The following example shows output from the debug bfd packet command. The IP address has been specifiedin order to limit the packet information to one interface:
Router# debug bfd packet 172.16.10.5BFD packet debugging is on*Jan 26 14:47:37.645: Tx*IP: dst 172.16.10.1, plen 24. BFD: diag 2, St/D/P/F (1/0/0/0),mult 5, len 24, loc/rem discr 1 1, tx 1000000, rx 1000000 100000, timer 1000 ms, #103*Jan 26 14:47:37.645: %OSPF-5-ADJCHG: Process 10, Nbr 172.16.10.12 on Ethernet1/4 from FULLto DOWN, Neighbor Down: BFD node down*Jan 26 14:47:50.685: %OSPF-5-ADJCHG: Process 10, Nbr 172.16.10.12 on Ethernet1/4 fromLOADING to FULL, Loading Done*Jan 26 14:48:00.905: Rx IP: src 172.16.10.1, plen 24. BFD: diag 0, St/D/P/F (1/0/0/0),mult 4, len 24, loc/rem discr 2 1, tx 1000000, rx 1000000 100000, timer 4000 ms, #50*Jan 26 14:48:00.905: Tx IP: dst 172.16.10.1, plen 24. BFD: diag 2, St/D/P/F (2/0/0/0),mult 5, len 24, loc/rem discr 1 2, tx 1000000, rx 1000000 100000, timer 1000 ms, #131*Jan 26 14:48:00.905: Rx IP: src 172.16.10.1, plen 24. BFD: diag 0, St/D/P/F (3/0/0/0),mult 4, len 24, loc/rem discr 2 1, tx 1000000, rx 1000000 100000, timer 4000 ms, #51*Jan 26 14:48:00.905: Tx IP: dst 172.16.10.1, plen 24. BFD: diag 0, St/D/P/F (3/0/0/0),mult 5, len 24, loc/rem discr 1 2, tx 1000000, rx 1000000 100000, timer 1000 ms, #132
Cisco IOS Debug Command Reference - Commands A through D174
debug backhaul-session-manager session through debug channel packetsdebug bfd
The following example shows output from the debug bfd event command when an interface between twoBFD neighbor routers fails and then comes back online:
Router# debug bfd event22:53:48: BFD: bfd_neighbor - action:DESTROY, proc:1024, idb:FastEthernet0/1,neighbor:172.16.10.222:53:48: BFD: bfd_neighbor - action:DESTROY, proc:512, idb:FastEthernet0/1,neighbor:172.16.10.222:53:49: Session [172.16.10.1,172.16.10.2,Fa0/1,1], event DETECT TIMER EXPIRED, state UP-> FAILING...22:56:35: BFD: bfd_neighbor - action:CREATE, proc:1024, idb:FastEthernet0/1,neighbor:172.16.10.222:56:37: Session [172.16.10.1,172.16.10.2,Fa0/1,1], event RX IHY 0, state FAILING -> DOWN22:56:37: Session [172.16.10.1,172.16.10.2,Fa0/1,1], event RX IHY 0, state DOWN -> INIT22:56:37: Session [172.16.10.1,172.16.10.2,Fa0/1,1], event RX IHY 1, state INIT -> UPThe table below describes the significant fields shown in the display.
Table 35: debug bfd event Field Descriptions
DescriptionField
The BFD neighbor will tear down the BFD session.bfd_neighbor - action:DESTROY
IP addresses of the BFD neighbors holding thissession that is carried over FastEthernet interface 0/1.
Session [172.16.10.1, 172.16.10.2, Fa0/1,1]
The BFD neighbor has not received BFD controlpackets within the negotiated interval and the detecttimer has expired.
event DETECT TIMER EXPIRED
The BFD event state is changing from Up to Failing.state UP -> FAILING
The BFD session between the neighbors indicated bythe IP addresses that is carried over FastEthernetinterface 0/1 is changing state from Failing to Down.The I Hear You (IHY) bit value is shown as 0 toindicate that the remote system is tearing down theBFD session.
Session [172.16.10.1, 172.16.10.2, Fa0/1,1], eventRX IHY 0
The BFD session is still considered down, and theIHY bit value still is shown as 0, and the session statechanges from DOWN to INIT to indicate that theBFD session is again initializing, as the interfacecomes back up.
event RX IHY 0, state DOWN -> INIT
The BFD session has been reestablished, and the IHYbit value changes to 1 to indicate that the session islive. The BFD session state changes from INIT toUP.
event RX IHY 1, state INIT -> UP
Cisco IOS Debug Command Reference - Commands A through D 175
debug backhaul-session-manager session through debug channel packetsdebug bfd
The following example shows output from the debug bfd packet command when an interface between twoBFD neighbor routers fails and then comes back online. The diagnostic code changes from 0 (No Diagnostic)to 1 (Control Detection Time Expired) because no BFD control packets could be sent (and therefore detectedby the BFD peer) after the interface fails. When the interface comes back online, the diagnostic code changesback to 0 to signify that BFD packets can be sent and received by the BFD peers.
Router# debug bfd packet23:03:25: Rx IP: src 172.16.10.2, plen 24. BFD: diag 0, H/D/P/F (0/0/0/0), mult 3, len 24,loc/rem discr 5 1, tx 1000000, rx 10000723:03:25: Tx IP: dst 172.16.10.2, plen 24. BFD: diag 1, H/D/P/F (0/0/0/0), mult 5, len 24,loc/rem discr 1 5, tx 1000000, rx 100000823:03:25: Tx IP: dst 172.16.10.2, plen 24. BFD: diag 1, H/D/P/F (1/0/0/0), mult 5, len 24,loc/rem discr 1 5, tx 1000000, rx 1000009The table below describes the significant fields shown in the display.
Table 36: debug bfd packet Field Descriptions
DescriptionField
The router has received this BFD packet from theBFD router with source address 172.16.10.2.
Rx IP: src 172.16.10.2
Length of the BFD control packet, in bytes.plen 24
A diagnostic code specifying the local system’s reasonfor the last transition of the session from Up to someother state.
State values are as follows:
• 0--No Diagnostic
• 1--Control Detection Time Expired
• 2--Echo Function Failed
• 3--Neighbor Signaled Session Down
• 4--Forwarding Plane Reset
• 5--Path Down
• 6--Concentrated Path Down
• 7--Administratively Down
diag 0
Cisco IOS Debug Command Reference - Commands A through D176
debug backhaul-session-manager session through debug channel packetsdebug bfd
DescriptionField
H bit--Hear You bit. This bit is set to 0 if thetransmitting system either is not receiving BFDpackets from the remote system or is tearing downthe BFD session. During normal operation the I HearYou bit is set to 1.
D bit--Demand Mode bit. If the Demand Mode bitset, the transmitting system wants to operate indemand mode. BFS has two modes--asynchronousand demand. The Cisco implementation of BFDsupports only asynchronous mode.
P bit--Poll bit. If the Poll bit is set, the transmittingsystem is requesting verification of connectivity orof a parameter change.
F bit--Final bit. If the Final bit is set, the transmittingsystem is responding to a received BFC control packetthat had a Poll (P) bit set.
H/D/P/F (0/0/0/0)
Detect time multiplier. The negotiated transmitinterval, multiplied by the detect time multiplier,determines the detection time for the transmittingsystem in BFD asynchronous mode.
The detect time multiplier is similar to the hellomultiplier in IS-IS, which is used to determine thehold timer: (hellointerval) * (hellomultiplier) = holdtimer. If a hello packet is not received within thehold-timer interval, a failure has occurred.
Similarly, for BFD: (transmit interval) * (detectmultiplier) = detect timer. If a BFD control packet isnot received from the remote system within thedetect-timer interval, a failure has occurred.
mult 3
The BFD packet length.len 24
The values for My Discriminator (local) and YourDiscriminator (remote) BFD neighbors.
• My Discriminator--Unique, nonzerodiscriminator value generated by thetransmitting system, used to demultiplexmultiple BFD sessions between the same pairof systems.
• Your Discriminator--The discriminator receivedfrom the corresponding remote system. Thisfield reflects the received value of MyDiscriminator, or is zero if that value isunknown.
loc/rem discr 5 1
Cisco IOS Debug Command Reference - Commands A through D 177
debug backhaul-session-manager session through debug channel packetsdebug bfd
DescriptionField
Desired minimum transmit interval.tx 1000000
Required minimum receive interval.rx 100007
Cisco IOS Debug Command Reference - Commands A through D178
debug backhaul-session-manager session through debug channel packetsdebug bfd
debug bgp ipv6 dampeningTo display debugging messages for IPv6 Border Gateway Protocol (BGP) dampening, use the debug bgp ipv6dampening command in privileged EXEC mode. To disable debugging messages for IPv6 BGP dampening,use the no form of this command.
debug bgp ipv6 {unicast| multicast} dampening [prefix-list prefix-list-name]
no debug bgp ipv6 {unicast| multicast} dampening [prefix-list prefix-list-name]
Syntax Description Specifies IPv6 unicast address prefixes.unicast
Specifies IPv6 multicast address prefixes.multicast
(Optional) Name of an IPv6 prefix list.prefix-list prefix-list-name
Command Default Debugging for IPv6 BGP dampening packets is not enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(2)T
This command was integrated into Cisco IOS Release 12.0(21)ST.12.0(21)ST
This command was integrated into Cisco IOS Release 12.0(22)S.12.0(22)S
The prefix-list keyword was added.12.2(13)T
The prefix-list keyword was added.12.0(24)S
This command was integrated into Cisco IOS Release 12.2(14)S.12.2(14)S
This command was integrated into Cisco IOS Release 12.2(28)SB.12.2(28)SB
This command was integrated into Cisco IOS Release 12.2(25)SG.12.2(25)SG
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SXH.12.2(33)SXH
This command was introduced on Cisco ASR 1000 Series Routers.Cisco IOS XE Release 2.1
Cisco IOS Debug Command Reference - Commands A through D 179
debug backhaul-session-manager session through debug channel packetsdebug bgp ipv6 dampening
Usage Guidelines The debug bgp ipv6 dampeningcommand is similar to the debug ip bgp dampeningcommand, except thatit is IPv6-specific.
Use the prefix-list keyword and an argument to filter BGP IPv6 dampening debug information through anIPv6 prefix list.
By default, the network server sends the output from debug commands and system error messages to theconsole. To redirect debugging output, use the logging command options within global configurationmode. Destinations are the console, virtual terminals, internal buffer, and UNIX hosts running a syslogserver.
Note
Examples The following is sample output from the debug bgp ipv6 dampeningcommand:
Router# debug bgp ipv6 dampening00:13:28:BGP(1):charge penalty for 2000:0:0:1::/64 path 2 1 with halflife-time 15reuse/suppress 750/200000:13:28:BGP(1):flapped 1 times since 00:00:00. New penalty is 100000:13:28:BGP(1):charge penalty for 2000:0:0:1:1::/80 path 2 1 with halflife-time 15reuse/suppress 750/200000:13:28:BGP(1):flapped 1 times since 00:00:00. New penalty is 100000:13:28:BGP(1):charge penalty for 2000:0:0:5::/64 path 2 1 with halflife-time 15reuse/suppress 750/200000:13:28:BGP(1):flapped 1 times since 00:00:00. New penalty is 100000:16:03:BGP(1):charge penalty for 2000:0:0:1::/64 path 2 1 with halflife-time 15reuse/suppress 750/200000:16:03:BGP(1):flapped 2 times since 00:02:35. New penalty is 189200:18:28:BGP(1):suppress 2000:0:0:1:1::/80 path 2 1 for 00:27:30 (penalty 2671)00:18:28:halflife-time 15, reuse/suppress 750/200000:18:28:BGP(1):suppress 2000:0:0:1::/64 path 2 1 for 00:27:20 (penalty 2664)00:18:28:halflife-time 15, reuse/suppress 750/2000The following example shows output for the debug bgp ipv6 dampeningcommand filtered through the prefixlist named marketing:
Router# debug bgp ipv6 dampening prefix-list marketing00:16:08:BGP(1):charge penalty for 2001:0DB8::/64 path 30 with halflife-time 15reuse/suppress 750/200000:16:08:BGP(1):flapped 1 times since 00:00:00. New penalty is 10The table below describes the fields shown in the display.
Table 37: debug bgp ipv6 dampening Field Descriptions
DescriptionField
Numerical value of 1000 assigned to a route by arouter configured for route dampening in anotherautonomous system each time a route flaps. Penaltiesare cumulative. The penalty for the route is stored inthe BGP routing table until the penalty exceeds thesuppress limit. If the penalty exceeds the suppresslimit, the route state changes from history to damp.
penalty
Cisco IOS Debug Command Reference - Commands A through D180
debug backhaul-session-manager session through debug channel packetsdebug bgp ipv6 dampening
DescriptionField
Number of times a route is available, then unavailable,or vice versa.
flapped
Amount of time (in minutes) by which the penalty isdecreased after the route is assigned a penalty. Thehalflife-time value is half of the half-life period(which is 15 minutes by default). Penalty reductionhappens every 5 seconds.
halflife-time
The limit by which a route is unsuppressed. If thepenalty for a flapping route decreases and falls belowthis reuse limit, the route is unsuppressed. That is, theroute is added back to the BGP table and once againused for forwarding. The default reuse limit is 750.Routes are unsuppressed at 10-second increments.Every 10 seconds, the router determines which routesare now unsuppressed and advertises them to theworld.
reuse
Limit by which a route is suppressed. If the penaltyexceeds this limit, the route is suppressed. The defaultvalue is 2000.
suppress
Maximum amount of time (in minutes) a route issuppressed. The default value is four times thehalf-life period.
maximum suppress limit (not shown in sample output)
State in which the route has flapped so often that therouter will not advertise this route to BGP neighbors.
damp state (not shown in sample output)
Related Commands DescriptionCommand
Displays debugging messages for IPv6 BGP updatepackets.
debug bgp ipv6 updates
Cisco IOS Debug Command Reference - Commands A through D 181
debug backhaul-session-manager session through debug channel packetsdebug bgp ipv6 dampening
debug bgp ipv6 updatesTo display debugging messages for IPv6 Border Gateway Protocol (BGP) update packets, use the debug bgpipv6 updates command in privileged EXEC mode. To disable debugging messages for IPv6 BGP updatepackets, use the no form of this command.
debug bgp ipv6 {unicast| multicast} updates [ ipv6-address ] [prefix-list prefix-list-name] [in| out]
no debug bgp ipv6 {unicast| multicast} updates [ ipv6-address ] [prefix-list prefix-list-name] [in| out]
Syntax Description Specifies IPv6 unicast address prefixes.unicast
Specifies IPv6 multicast address prefixes.multicast
(Optional) The IPv6 address of a BGP neighbor.
This argument must be in the form documented inRFC 2373 where the address is specified inhexadecimal using 16-bit values between colons.
ipv6-address
(Optional) Name of an IPv6 prefix list.prefix-list prefix-list-name
(Optional) Indicates inbound updates.in
(Optional) Indicates outbound updates.out
Command Default Debugging for IPv6 BGP update packets is not enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(2)T
This command was integrated into Cisco IOS Release 12.0(21)ST.12.0(21)ST
This command was integrated into Cisco IOS Release 12.0(22)S.12.0(22)S
The prefix-list keyword was added.12.2(13)T
The prefix-list keyword was added.12.0(24)S
This command was integrated into Cisco IOS Release 12.2(14)S.12.2(14)S
This command was integrated into Cisco IOS Release 12.2(28)SB.12.2(28)SB
Cisco IOS Debug Command Reference - Commands A through D182
debug backhaul-session-manager session through debug channel packetsdebug bgp ipv6 updates
ModificationRelease
This command was integrated into Cisco IOS Release 12.2(25)SG.12.2(25)SG
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SXH.12.2(33)SXH
This command was introduced on Cisco ASR 1000 Series Routers.Cisco IOS XE Release 2.1
Usage Guidelines The debug bgp ipv6 updatescommand is similar to the debug ip bgp updatescommand, except that it isIPv6-specific.
Use the prefix-list keyword to filter BGP IPv6 updates debugging information through an IPv6 prefix list.
By default, the network server sends the output from debug commands and system error messages to theconsole. To redirect debugging output, use the logging command options within global configurationmode. Destinations are the console, virtual terminals, internal buffer, and UNIX hosts running a syslogserver. For complete information on debug commands and redirecting debugging output, refer to theRelease 12.2 Cisco IOS Debug Command Reference .
Note
Examples The following is sample output from the debug bgp ipv6 updatescommand:
Router# debug bgp ipv6 updates14:04:17:BGP(1):2000:0:0:2::2 computing updates, afi 1, neighbor version 0, table version1, starting at ::14:04:17:BGP(1):2000:0:0:2::2 update run completed, afi 1, ran for 0ms, neighbor version0, start version 1, throttled to 114:04:19:BGP(1):sourced route for 2000:0:0:2::1/64 path #0 changed (weight 32768)14:04:19:BGP(1):2000:0:0:2::1/64 route sourced locally14:04:19:BGP(1):2000:0:0:2:1::/80 route sourced locally14:04:19:BGP(1):2000:0:0:3::2/64 route sourced locally14:04:19:BGP(1):2000:0:0:4::2/64 route sourced locally14:04:22:BGP(1):2000:0:0:2::2 computing updates, afi 1, neighbor version 1, table version6, starting at ::14:04:22:BGP(1):2000:0:0:2::2 send UPDATE (format) 2000:0:0:2::1/64, next 2000:0:0:2::1,metric 0, path14:04:22:BGP(1):2000:0:0:2::2 send UPDATE (format) 2000:0:0:2:1::/80, next 2000:0:0:2::1,metric 0, path14:04:22:BGP(1):2000:0:0:2::2 send UPDATE (prepend, chgflags:0x208) 2000:0:0:3::2/64, next2000:0:0:2::1, metric 0, path14:04:22:BGP(1):2000:0:0:2::2 send UPDATE (prepend, chgflags:0x208) 2000:0:0:4::2/64, next2000:0:0:2::1, metric 0, pathThe following is sample output from the debug bgp ipv6 updatescommand filtered through the prefix listnamed sales:
Router# debug bgp ipv6 updates prefix-list sales00:18:26:BGP(1):2000:8493:1::2 send UPDATE (prepend, chgflags:0x208) 7878:7878::/64, next2001:0DB8::36C, metric 0, pathThe table below describes the significant fields shown in the display.
Cisco IOS Debug Command Reference - Commands A through D 183
debug backhaul-session-manager session through debug channel packetsdebug bgp ipv6 updates
Table 38: debug bgp ipv6 updates Field Descriptions
DescriptionField
BGP debugging for address family index (afi) 1.BGP(1):
Address family index.afi
Version of the BGP table on the neighbor fromwhichthe update was received.
neighbor version
Version of the BGP table on the router from whichyou entered the debug bgp ipv6 updates command.
table version
Starting at the network layer reachability information(NLRI). BGP sends routing update messagescontaining NLRI to describe a route and how to getthere. In this context, an NLRI is a prefix. A BGPupdate message carries one or more NLRI prefixesand the attributes of a route for the NLRI prefixes;the route attributes include a BGP next hop gatewayaddress, community values, and other information.
starting at
Indicates that a route is sourced locally and thatupdates are not sent for the route.
route sourced locally
Indicates that an update message for a reachablenetwork should be formatted. Addresses includeprefix and next hop.
send UPDATE (format)
Indicates that an update message about a path to aBGP peer should be written.
send UPDATE (prepend, chgflags:0x208)
Related Commands DescriptionCommand
Displays debugging messages for IPv6 BGPdampening packets.
debug bgp ipv6 dampening
Cisco IOS Debug Command Reference - Commands A through D184
debug backhaul-session-manager session through debug channel packetsdebug bgp ipv6 updates
debug bgp l2vpn evpn updatesTo display information related to the Boarder Gateway Protocol (BGP) update messages, use the debug bgpl2vpn evpn updates command in privileged EXECmode. To disable the display of such debugging information,use the no form of this command.
debug bgp l2vpn evpn updates [ ip-address ] [{access-list| expanded-access-list} [in| out]| events| in| out]
no debug bgp l2vpn evpn updates [ ip-address ] [{access-list| expanded-access-list} [in| out]| events| in|out]
Syntax Description (Optional) BGP neighbor address in the formatA.B.C.D.
ip-address
(Optional) Number of the access list used to filterdebugging messages. The range is from 1 to 199.
access-list
(Optional) Number of the expanded access list usedto filter debugging messages. The range is from 1300to 2699.
expanded-access-list
(Optional) Specifies debugging messages for BGPupdate events.
events
Specifies debugging messages for inbound BGPupdate information.
in
Specifies debugging messages for outbound BGPupdate information.
out
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.Cisco IOS XE Release 3.11S
This command was integrated into Cisco IOS Release 15.4(1)S.15.4(1)S
Examples The following example shows how to enable the debug bgp l2vpn evpn updates command:
Device> enableDevice# debug bgp l2vpn evpn updates
Cisco IOS Debug Command Reference - Commands A through D 185
debug backhaul-session-manager session through debug channel packetsdebug bgp l2vpn evpn updates
Related Commands DescriptionCommand
Displays information about the processing of BGPupdates.
debug ip bgp updates
Displays L2VPN Ethernet VPN address familyinformation from the BGP table.
show bgp l2vpn evpn
Cisco IOS Debug Command Reference - Commands A through D186
debug backhaul-session-manager session through debug channel packetsdebug bgp l2vpn evpn updates
debug bgp l2vpn vpls updatesTo enable debugging of the L2VPN VPLS address family updates from the BGP table, use the debug bgpl2vpn vpls updates command in privileged EXEC mode. To disable the display of the messages, use the noform of this command.
debug bgp l2vpn vpls updates [access-list | expanded-access-list | bgp-neighbor-address | events | {in | out}]
nodebug bgp l2vpn vpls updates [access-list | expanded-access-list | bgp-neighbor-address | events | {in |out }]
Syntax Description (Optional) Number of an access listused to filter debugging messages.The range is from 1 to 199.
access-list
(Optional) Number of an expandedaccess list used to filter debuggingmessages. The range is from 1300to 2699.
expanded-access-list
(Optional) BGP neighbor addressin the format A.B.C.D.
bgp-neighbor-address
(Optional) Specifies debuggingmessages for BGP update events.
events
Specifies debugging messages forinbound BGP update information.
in
Specifies debugging messages foroutbound BGP update information.
out
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.Cisco IOS XE Release 3.8S
Examples The following shows how to enable the debug bgp l2vpn vpls updates command:Device> enableDevice# debug bgp l2vpn vpls updatesBGP updates debugging is on for address family: L2VPN Vpls
Cisco IOS Debug Command Reference - Commands A through D 187
debug backhaul-session-manager session through debug channel packetsdebug bgp l2vpn vpls updates
Related Commands DescriptionCommand
Displays information about theprocessing of BGP updates.
debug ip bgp updates
Displays L2VPN VPLS addressfamily information from the BGPtable.
show bgp l2vpn vpls
Cisco IOS Debug Command Reference - Commands A through D188
debug backhaul-session-manager session through debug channel packetsdebug bgp l2vpn vpls updates
debug bgp nsapTo enable the display of Border Gateway Protocol (BGP) debugging information specific to the networkservice access point (NSAP) address family, use the debugbgpnsap command in privileged EXEC mode. Todisable debugging output, use the no form of this command.
debug bgp nsap
no debug bgp nsap
Syntax Description This command has no arguments or keywords.
Command Default Debugging of BGP NSAP address-family code is not enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(8)T
This command was integrated into Cisco IOS Release 12.2(33)SRB.12.2(33)SRB
This command was integrated into Cisco IOS XE Release 2.6.Cisco IOS XE 2.6
Usage Guidelines The debugbgpnsapcommand is similar to the debugipbgpcommand, except that it is specific to the NSAPaddress family.
By default, the network server sends the output from debug commands and system error messages to theconsole. To redirect debug output, use the logging command options within global configuration mode.Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslogserver.
Note
Examples The following example shows output for the debugbgpnsapcommand. The BGP(4) identifies that BGPversion 4 is operational.
Router# debug bgp nsap00:46:46: BGP(4): removing CLNS route to 49.010100:46:46: BGP(4): removing CLNS route to 49.030300:46:46: BGP(4): removing CLNS route to 49.040400:46:46: BGP(4): 10.1.2.1 removing CLNS route 49.0101.1111.1111.1111.1111.00 toeBGP-neighbor00:46:46: BGP(4): 10.2.4.4 removing CLNS route 49.0303.4444.4444.4444.4444.00 toeBGP-neighbor
Cisco IOS Debug Command Reference - Commands A through D 189
debug backhaul-session-manager session through debug channel packetsdebug bgp nsap
00:46:59: BGP(4): Applying map to find origin for prefix 49.0202.222200:46:59: BGP(4): Applying map to find origin for prefix 49.0202.3333
Related Commands DescriptionCommand
Displays debug messages for BGP NSAP prefixdampening events.
debug bgp nsap dampening
Displays debug messages for BGP NSAP prefixupdate packets.
debug bgp nsap updates
Cisco IOS Debug Command Reference - Commands A through D190
debug backhaul-session-manager session through debug channel packetsdebug bgp nsap
debug bgp nsap dampeningTo display debug messages for Border Gateway Protocol (BGP) network service access point (NSAP) prefixaddress dampening, use the debugbgpnsapdampening command in privileged EXEC mode. To disabledebugging output, use the no form of this command.
debug bgp nsap dampening [filter-list access-list-number]
no debug bgp nsap dampening [filter-list access-list-number]
Syntax Description (Optional) Displays debug messages for BGP NSAPdampening events that match the access list. Theacceptable access list number range is from 1 to 199.
filter-list access-list-number
Command Default Debugging for BGP NSAP dampening events is not enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(8)T
This command was integrated into Cisco IOS Release 12.2(33)SRB.12.2(33)SRB
This command was integrated into Cisco IOS XE Release 2.6.Cisco IOS XE 2.6
Usage Guidelines The debugbgpnsapdampeningcommand is similar to the debugipbgpdampeningcommand, except that itis specific to the NSAP address family.
By default, the network server sends the output from debug commands and system error messages to theconsole. To redirect debug output, use the logging command options within global configuration mode.Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslogserver.
Note
Examples The following example shows output for the debugbgpnsapdampeningcommand:
Router# debug bgp nsap dampening16:21:34: BGP(4): Dampening route-map modified.
Cisco IOS Debug Command Reference - Commands A through D 191
debug backhaul-session-manager session through debug channel packetsdebug bgp nsap dampening
Only one line of output is displayed unless thebgpdampening command is configured with a route map inNSAP address family configuration mode. The following example shows output for thedebugbgpnsapdampeningcommand when a route map is configured:
20:07:19: BGP(4): charge penalty for 49.0404 path 65202 65404 with halflife-time 15reuse/suppress 750/200020:07:19: BGP(4): flapped 1 times since 00:00:00. New penalty is 100020:08:59: BGP(4): charge penalty for 49.0404 path 65202 65404 with halflife-time 15reuse/suppress 750/200020:08:59: BGP(4): flapped 2 times since 00:01:39. New penalty is 192820:10:04: BGP(4): charge penalty for 49.0404 path 65202 65404 with halflife-time 15reuse/suppress 750/200020:10:04: BGP(4): flapped 3 times since 00:02:44. New penalty is 283920:10:48: BGP(4): suppress 49.0404 path 65202 65404 for 00:28:10 (penalty 2752)20:10:48: halflife-time 15, reuse/suppress 750/2000The table below describes the significant fields shown in the display.
Table 39: debug bgp nsap dampening Field Descriptions
DescriptionField
Numerical value of 1000 assigned to a route by arouter configured for route dampening in anotherautonomous system each time a route flaps. Penaltiesare cumulative. The penalty for the route is stored inthe BGP routing table until the penalty exceeds thesuppress limit. If the penalty exceeds the suppresslimit, the route state changes from history to damp.
penalty
Amount by which the penalty is decreased after theroute is assigned a penalty. The half-life-time valueis half of the half-life period (which is 15 minutes bydefault). Penalty reduction occurs every 5 seconds.
halflife-time
Number of times a route is available, then unavailable,or vice versa.
flapped
The limit by which a route is unsuppressed. If thepenalty for a flapping route decreases and falls belowthis reuse limit, the route is unsuppressed. That is, theroute is added back to the BGP table and once againused for forwarding. The default reuse limit is 750.Unsuppressing of routes occurs at 10-secondincrements. Every 10 seconds, the router learns whichroutes are now unsuppressed and advertises themthroughout the network.
reuse
Limit by which a route is suppressed. If the penaltyexceeds this limit, the route is suppressed. The defaultvalue is 2000.
suppress
Maximum amount of time a route is suppressed. Thedefault value is four times the half-life period.
maximum suppress limit (not shown in sample output)
Cisco IOS Debug Command Reference - Commands A through D192
debug backhaul-session-manager session through debug channel packetsdebug bgp nsap dampening
DescriptionField
State in which the route has flapped so often that therouter will not advertise this route to BGP neighbors.
damp state (not shown in sample output)
Related Commands DescriptionCommand
Displays debug messages for BGP NSAP packets.debug bgp nsap
Displays debug messages for BGP NSAP updateevents.
debug bgp nsap updates
Cisco IOS Debug Command Reference - Commands A through D 193
debug backhaul-session-manager session through debug channel packetsdebug bgp nsap dampening
debug bgp nsap updatesTo display debug messages for Border Gateway Protocol (BGP) network service access point (NSAP) prefixaddress update packets, use the debugbgpnsapupdates command in privileged EXEC mode. To disabledebugging output, use the no form of this command.
debug bgp nsap updates [ ip-address ] [in| out] [filter-set clns-filter-set-name]
no debug bgp nsap updates [ ip-address ] [in| out] [filter-set clns-filter-set-name]
Syntax Description (Optional) The IP address of a BGP neighbor.ip-address
(Optional) Indicates inbound updates.in
(Optional) Indicates outbound updates.out
(Optional) Name of a Connectionless NetworkService (CLNS) filter set.
filter-set clns-filter-set-name
Command Default Debugging for BGP NSAP prefix update packets is not enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(8)T
This command was integrated into Cisco IOS Release 12.2(33)SRB.12.2(33)SRB
This command was integrated into Cisco IOS XE Release 2.6.Cisco IOS XE 2.6
Usage Guidelines The debugbgpnsapupdatescommand is similar to the debugipbgpupdatescommand, except that it is specificto the NSAP address family.
Use the ip-address argument to display the BGP update debug messages for a specific BGP neighbor. Usethe clns-filter-set-name argument to display the BGP update debug messages for a specific NSAP prefix.
Cisco IOS Debug Command Reference - Commands A through D194
debug backhaul-session-manager session through debug channel packetsdebug bgp nsap updates
By default, the network server sends the output from debug commands and system error messages to theconsole. To redirect debug output, use the logging command options within global configuration mode.Destinations include the console, virtual terminals, internal buffer, and UNIX hosts running a syslogserver.
Note
Examples The following example shows output for the debugbgpnsapupdatescommand:
Router# debug bgp nsap updates02:13:45: BGP(4): 10.0.3.4 send UPDATE (format) 49.0101, next 49.0303.3333.3333.3333.3333.00,metric 0, path 65202 6510102:13:45: BGP(4): 10.0.3.4 send UPDATE (format) 49.0202, next 49.0303.3333.3333.3333.3333.00,metric 0, path 6520202:13:45: BGP(4): 10.0.3.4 send UPDATE (format) 49.0303, next 49.0303.3333.3333.3333.3333.00,metric 0, path02:13:45: BGP(4): 10.0.2.2 send UPDATE (format) 49.0404, next 49.0303.3333.3333.3333.3333.00,metric 0, path 65404The table below describes the significant fields shown in the display.
Table 40: debug bgp nsap updates Field Descriptions
DescriptionField
BGP debug for address family index (afi) 4.BGP(4):
Indicates that a route is sourced locally and thatupdates are not sent for the route.
route sourced locally (not shown in display)
Indicates that an update message for a reachablenetwork should be formatted. Addresses includeNSAP prefix and next hop.
send UPDATE (format)
Indicates that an update message about a path to aBGP peer has been received. Addresses includeNSAPprefix.
rcv UPDATE (not shown in display)
Related Commands DescriptionCommand
Displays debug messages for BGP NSAP packets.debug bgp nsap
Displays debug messages for BGP NSAP prefixdampening events.
debug bgp nsap dampening
Cisco IOS Debug Command Reference - Commands A through D 195
debug backhaul-session-manager session through debug channel packetsdebug bgp nsap updates
debug bgp vpnv6 unicastTo display Border Gateway Protocol (BGP) virtual private network (VPN) debugging output, use the debugbgp vpnv6 unicastcommand in privileged EXECmode. To disable debugging output, use the no form of thiscommand.
debug bgp vpnv6 unicast
no debug bgp vpnv6
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(33)SRB
This command was integrated into Cisco IOS Release 12.2(33)SB.12.2(33)SB
This command was integrated into Cisco IOS Release 12.2(33)SXI.12.2(33)SXI
Usage Guidelines Use the debug bgp vpnv6 unicastcommand to help troubleshoot the BGP VPN.
By default, the network server sends the output from debug commands and system error messages to theconsole. To redirect debugging output, use the logging command options within global configurationmode. Destinations are the console, virtual terminals, internal buffer, and UNIX hosts running a syslogserver. For complete information on debug commands and redirecting debugging output, refer to the CiscoIOS Debug Command Reference, Release 12.4.
Note
Examples The following example enables BGP debugging output for IPv6 VPN instances:
Router# debug bgp vpnv6 unicast
Cisco IOS Debug Command Reference - Commands A through D196
debug backhaul-session-manager session through debug channel packetsdebug bgp vpnv6 unicast
debug bri-interfaceTo display debugging information on ISDN BRI routing activity, use the debugbri-interface command inprivileged EXEC mode. To disable debugging output, use the noform of this command.
debug bri-interface
no debug bri-interface
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines Thedebugbri-interface command indicates whether the ISDN code is enabling and disabling the B channelswhen attempting an outgoing call. This command is available for the low-end router products that have amulti-BRI network interface module installed.
Because the debugbri-interfacecommand generates a substantial amount of output, use it only whentraffic on the IP network is low, so other activity on the system is not adversely affected.
Caution
Examples The following is sample output from the debugbri-interface command:
Router# debug bri-interfaceBRI: write_sid: wrote 1B for subunit 0, slot 1.BRI: write_sid: wrote 15 for subunit 0, slot 1.BRI: write_sid: wrote 17 for subunit 0, slot 1.BRI: write_sid: wrote 6 for subunit 0, slot 1.BRI: write_sid: wrote 8 for subunit 0, slot 1.BRI: write_sid: wrote 11 for subunit 0, slot 1.BRI: write_sid: wrote 13 for subunit 0, slot 1.BRI: write_sid: wrote 29 for subunit 0, slot 1.BRI: write_sid: wrote 1B for subunit 0, slot 1.BRI: write_sid: wrote 15 for subunit 0, slot 1.BRI: write_sid: wrote 17 for subunit 0, slot 1.BRI: write_sid: wrote 20 for subunit 0, slot 1.BRI: Starting Power Up timer for unit = 0.BRI: write_sid: wrote 3 for subunit 0, slot 1.BRI: Starting T3 timer after expiry of PUP timeout for unit = 0, current state is F4.BRI: write_sid: wrote FF for subunit 0, slot 1.BRI: Activation for unit = 0, current state is F7.BRI: enable channel B1BRI: write_sid: wrote 14 for subunit 0, slot 1.%LINK-3-UPDOWN: Interface BRI0: B-Channel 1, changed state to up%LINK-5-CHANGED: Interface BRI0: B-Channel 1, changed state to up.!!!BRI: disable channel B1BRI: write_sid: wrote 15 for subunit 0, slot 1.%LINK-3-UPDOWN: Interface BRI0: B-Channel 1, changed state to down%LINK-5-CHANGED: Interface BRI0: B-Channel 1, changed state to down%LINEPROTO-5-UPDOWN: Line protocol on Interface BRI0: B-Channel 1, changed state to down
Cisco IOS Debug Command Reference - Commands A through D 197
debug backhaul-session-manager session through debug channel packetsdebug bri-interface
The following line indicates that an internal command was written to the interface controller. The subunitidentifies the first interface in the slot.
BRI: write_sid: wrote 1B for subunit 0, slot 1.The following line indicates that the power-up timer was started for the named unit:
BRI: Starting Power Up timer for unit = 0.The following lines indicate that the channel or the protocol on the interface changed state:
%LINK-3-UPDOWN: Interface BRI0: B-Channel 1, changed state to up%LINK-5-CHANGED: Interface BRI0: B-Channel 1, changed state to up.!!!%LINEPROTO-5-UPDOWN: Line protocol on Interface BRI0: B-Channel 1, changed state to downThe following line indicates that the channel was disabled:
BRI: disable channel B1Lines of output not described are for use by support staff only.
Related Commands DescriptionCommand
Displays ISDN events occurring on the user side (onthe router) of the ISDN interface.
debug isdn event
Displays data link-layer (Layer 2) access proceduresthat are taking place at the router on the D channel(LSPD).
debug isdn q921
Displays information about call setup and teardownof ISDN network connections (Layer 3) between thelocal router (user side) and the network.
debug isdn q931
Cisco IOS Debug Command Reference - Commands A through D198
debug backhaul-session-manager session through debug channel packetsdebug bri-interface
debug bsc eventTo display all events occurring in the Binary Synchronous Communications (Bisync) feature, use thedebugbscevent command in privileged EXEC mode. To disable debugging output, use the noform of thiscommand.
debug bsc event [ number ]
no debug bsc event [ number ]
Syntax Description (Optional) Group number.number
Command Modes Privileged EXEC
Usage Guidelines This command traces all interfaces configured with a bscprotocol-groupnumber command.
Examples The following is sample output from the debugbscevent command:
Router# debug bsc eventBSC: Serial2 POLLEE-FSM inp:E_LineFail old_st:CU_Down new_st:TCU_EOFileBSC: Serial2 POLLEE-FSM inp:E_LineFail old_st:CU_Down new_st:TCU_EOFileBSC: Serial2 POLLEE-FSM inp:E_LineFail old_st:CU_Down new_st:TCU_EOFile0:04:32: BSC: Serial2 :SDI-rx: 9 bytesBSC: Serial2 POLLEE-FSM inp:E_RxEtx old_st:CU_Down new_st:TCU_EOFile0:04:32: BSC: Serial2 :SDI-rx: 5 bytesBSC: Serial2 POLLEE-FSM inp:E_RxEnq old_st:CU_Down new_st:TCU_EOFileBSC: Serial2 POLLEE-FSM inp:E_Timeout old_st:CU_Down new_st:TCU_InFileBSC: Serial2 POLLEE-FSM inp:E_Timeout old_st:CU_Idle new_st:TCU_InFile%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial2, changed state to up%LINK-3-UPDOWN: Interface Serial2, changed state to upBSC: Serial2 POLLEE-FSM inp:E_Timeout old_st:CU_Idle new_st:TCU_InFile0:04:35: BSC: Serial2 :SDI-rx: 9 bytesBSC: Serial2 POLLEE-FSM inp:E_RxEtx old_st:CU_Idle new_st:TCU_InFile0:04:35: BSC: Serial2 :SDI-rx: 5 bytesBSC: Serial2 POLLEE-FSM inp:E_RxEnq old_st:CU_Idle new_st:TCU_InFile0:04:35: BSC: Serial2 :NDI-rx: 3 bytes
Related Commands DescriptionCommand
Displays all frames traveling through the Bisyncfeature.
debug bsc packet
Displays BSTUN connection events and status.debug bstun events
Cisco IOS Debug Command Reference - Commands A through D 199
debug backhaul-session-manager session through debug channel packetsdebug bsc event
debug bsc packetTo display all frames traveling through the Binary Synchronous Communications (Bisync) feature, use thedebugbscpacketcommand in privileged EXEC mode. To disable debugging output, use the noform of thiscommand.
debug bsc packet [group number] [buffer-size bytes]
no debug bsc packet [group number] [buffer-size bytes]
Syntax Description (Optional) Group number.group number
(Optional) Number of bytes displayed per packet(defaults to 20).
buffer-size bytes
Command Default The default number of bytes displayed is 20.
Command Modes Privileged EXEC
Usage Guidelines This command traces all interfaces configured with a bscprotocol-groupnumber command.
Examples The following is sample output from the debugbscpacket command:
Router# debug bsc packet
0:23:33: BSC: Serial2 :NDI-rx : 27 bytes 401A400227F5C31140C11D60C8C5D3D3D51D40130:23:33: BSC: Serial2 :SDI-tx : 12 bytes 00323237FF3232606040402D0:23:33: BSC: Serial2 :SDI-rx : 2 bytes 10700:23:33: BSC: Serial2 :SDI-tx : 27 bytes 401A400227F5C31140C11D60C8C5D3D3D51D40130:23:33: BSC: Serial2 :SDI-rx : 2 bytes 10610:23:33: BSC: Serial2 :SDI-tx : 5 bytes 00323237FF
Related Commands DescriptionCommand
Displays all events occurring in the Bisync feature.debug bsc event
Displays BSTUN connection events and status.debug bstun events
Cisco IOS Debug Command Reference - Commands A through D200
debug backhaul-session-manager session through debug channel packetsdebug bsc packet
debug bstun eventsTo display BSTUN connection events and status, use the debugbstuneventscommand in privileged EXECmode. To disable debugging output, use the noform of this command.
debug bstun events [ number ]
no debug bstun events [ number ]
Syntax Description (Optional) Group number.number
Command Modes Privileged EXEC
Usage Guidelines When you enable the debugbstunevents command, messages showing connection establishment and otheroverall status messages are displayed.
You can use thedebugbstuneventscommand to assist you in determining whether the BSTUN peers areconfigured correctly and are communicating. For example, if you enable thedebugbstunpacketcommandand you do not see any packets, you may want to enable event debugging.
Also refer to the debugbscpacketanddebugbscevent commands. Currently, these two commands supportthe only protocol working through the BSTUN tunnel. Sometimes frames do not go through the tunnelbecause they have been discarded at the Bisync protocol level.
Note
Examples The following is sample output from the debugbstuneventscommand of keepalivemessages working correctly.If the routers are configured correctly, at least one router will show reply messages.
Router# debug bstun eventsBSTUN: Received Version Reply opcode from (all[2])_172.16.12.2/1976 at 1360BSTUN: Received Version Request opcode from (all[2])_172.16.12.2/1976 at 1379BSTUN: Received Version Reply opcode from (all[2])_172.16.12.2/1976 at 1390
In a scenario where there is constantly loaded bidirectional traffic, you might not see keepalive messagesbecause they are sent only when the remote end has been silent for the keepalive period.
Note
The following is sample output from the debugbstuneventsoutput of an event trace in which the wrong TCPaddress has been specified for the remote peer. These are non-keepalive related messages.
Router# debug bstun eventsBSTUN: Change state for peer (C1[1])172.16.12.22/1976 (closed->opening)BSTUN: Change state for peer (C1[1])172.16.12.22/1976 (opening->open wait)%BSTUN-6-OPENING: CONN: opening peer (C1[1])172.16.12.22/1976, 3BSTUN: tcpd sender in wrong state, dropping packetBSTUN: tcpd sender in wrong state, dropping packetBSTUN: tcpd sender in wrong state, dropping packet
Cisco IOS Debug Command Reference - Commands A through D 201
debug backhaul-session-manager session through debug channel packetsdebug bstun events
Related Commands DescriptionCommand
Displays all events occurring in the Bisync feature.debug bsc event
Displays all frames traveling through the Bisyncfeature.
debug bsc packet
Displays packet information on packets travelingthrough the BSTUN links.
debug bstun packet
Cisco IOS Debug Command Reference - Commands A through D202
debug backhaul-session-manager session through debug channel packetsdebug bstun events
debug bstun packetTo display packet information on packets traveling through the BSTUN links, use the debugbstunpacketcommand in privileged EXEC mode. To disable debugging output, use the noform of this command.
debug bstun packet [group number] [buffer-size bytes]
no debug bstun packet [group number] [buffer-size bytes]
Syntax Description (Optional) BSTUN group number.group number
(Optional) Number of bytes displayed per packet(defaults to 20).
buffer-size bytes
Command Default The default number of bytes displayed is 20.
Command Modes Privileged EXEC
Examples The following is sample output from the debugbstunpacket command:
Router# debugbstun packetBSTUN bsc-local-ack: 0:00:00 Serial2 SDI: Addr: 40 Data: 02C1C1C1C1C1C1C1C1C1BSTUN bsc-local-ack: 0:00:00 Serial2 SDI: Addr: 40 Data: 02C1C1C1C1C1C1C1C1C1BSTUN bsc-local-ack: 0:00:06 Serial2 NDI: Addr: 40 Data: 0227F5C31140C11D60C8
Related Commands DescriptionCommand
Displays BSTUN connection events and status.debug bstun events
Cisco IOS Debug Command Reference - Commands A through D 203
debug backhaul-session-manager session through debug channel packetsdebug bstun packet
debug bundle errorsTo enable the display of information on bundle errors, use the debugbundleerrors command in privilegedEXEC mode. To disable debugging output, use the noform of this command.
debug bundle errors
no debug bundle errors
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.0(3)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines Use this command to enable the display of error information for a bundle, such as reports of inconsistentmapping in the bundle.
Related Commands DescriptionCommand
Configures the bumping rules for a VC class that canbe assigned to a VC bundle.
bump
Creates a bundle or modifies an existing bundle toenter bundle configuration mode.
bundle
Enables display of bundle events when use occurs.debug bundle events
Cisco IOS Debug Command Reference - Commands A through D204
debug backhaul-session-manager session through debug channel packetsdebug bundle errors
debug bundle eventsTo enable display of bundle events when use occurs, use the debugbundleevents command in privilegedEXEC mode. To disable the display, use the noform of this command.
debug bundle events
no debug bundle events
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.0(3)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines Use this command to enable the display of bundle events, such as occurrences of VC bumping, when bundleswere brought up, when they were taken down, and so forth.
Related Commands DescriptionCommand
Enables the display of information on bundle errors.debug bstun packet
Cisco IOS Debug Command Reference - Commands A through D 205
debug backhaul-session-manager session through debug channel packetsdebug bundle events
debug call-home diagnostic-signatureTo enable the debugging of call-home diagnostic signature flags on a device, use the debug call-homediagnostic-signature command in privileged EXEC mode. To disable debugging, use the no form of thiscommand.
debug call-home diagnostic-signature {action | all | api | cli | download | event-registration | parsing}
no debug call-home diagnostic-signature {action | all | api | cli | download | event-registration | parsing}
Syntax Description Displays debugging information associated with the execution of any call-homediagnostic signature action defined in the diagnostic signature file.
action
Displays debugging information about all flags associated with the call-homediagnostic signature.
all
Displays debugging information associated with call-home diagnostic signatureinternal operations or function calls.
api
Displays debugging information associated with the call-home diagnostic signatureto run the CLI commands as part of the diagnostic signature actions.
cli
Displays debugging information associated with the downloading of call-homediagnostic signature files from the HTTP/HTTPS servers.
download
Displays debugging information associated with the registration of call-homediagnostic signature events.
event-registration
Displays debugging information associated with the parsing of call-homediagnostic-signature files.
parsing
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.15.3(2)T
Examples The following is sample output from the debug call-home diagnostic-signature action command:
Device# debug call-home diagnostic-signature action
Jan 29 10:42:22.698 CST: DS-ACT-TRACE: call_home_ds_eem_cmd_run[969],cli cmd "show version", expect string "", max run time 20000Jan 29 10:42:22.726 CST: DS-ACT-TRACE: call_home_ds_cb_rcmd_lkup[501], cmd "show version"not exist
Cisco IOS Debug Command Reference - Commands A through D206
debug backhaul-session-manager session through debug channel packetsdebug call-home diagnostic-signature
Jan 29 10:42:22.726 CST: DS-ACT-TRACE: call_home_ds_cb_rcmd_add[518], cli show versionJan 29 10:42:22.726 CST: DS-ACT-TRACE: ds_action_element_next_get[918],CMD "show version" get the next cmd, done type:DONE_NONE...
The following is sample output from the debug call-home diagnostic-signature api command:
Device# debug call-home diagnostic-signature api
Jan 29 10:41:24.902 CST: DS-API-TRACE: call_home_all_lock[101], lock callhome and ds mutexJan 29 10:41:24.902 CST: DS-API-TRACE: call_home_ds_lock[42], lock call home ds semaphoreJan 29 10:41:24.902 CST: DS-API-TRACE: call_home_all_unlock[109], unlock callhome and dsmutexJan 29 10:41:24.902 CST: DS-API-TRACE: call_home_ds_unlock[52], unlock call home ds semaphore...
The following is sample output from the debug call-home diagnostic-signature cli command:
Device# debug call-home diagnostic-signature cli
Jan 29 10:44:31.402 CST: DS-CLI-TRACE: call_home_ds_eem_cmd_run[981], the first 100 charsof output cmd: show versionCisco IOS Software, C1861 Software (C1861-ADVENTERPRISEK9-M), Experimental Version 15.Jan 29 10:44:31.442 CST: DS-CLI-TRACE: call_home_ds_eem_cmd_run[981], the first 100 charsof output cmd: show loggingSyslog logging: enabled (0 messages dropped, 3 messages rate-limited, 0 flushes, 0 over...
The following is sample output from the debug call-home diagnostic-signature download command:
Device# debug call-home diagnostic-signature download
Jan 29 10:40:11.050 CST: DS-DNLD-TRACE: call_home_ds_update_thread_create[239], Creating adownload processJan 29 10:40:11.054 CST: DS-DNLD-TRACE: ds_download[119],url is "https://tools-stage.cisco.com/its/service/oddce/services/DDCEService", num_of_dsis 1Jan 29 10:40:11.054 CST: DS-DNLD-TRACE: ds_collect_content_prolog_values[370], CollectingXML content prolog valuesJan 29 10:40:11.054 CST: DS-DNLD-TRACE: ds_collect_content_prolog_values[489], SystemName:CH1861-1Jan 29 10:40:11.054 CST: DS-DNLD-TRACE: ds_collect_content_prolog_values[494], Unable toget SNMP contact stringJan 29 10:40:11.054 CST: DS-DNLD-TRACE: ds_collect_content_epilog_values[550], CollectingXML content epilog valuesJan 29 10:40:11.054 CST: DS-DNLD-TRACE: ds_collect_request_values[621], Collecting XML DSrequest values...
The following is sample output from the debug call-home diagnostic-signature event-registration command:
Device# debug call-home diagnostic-signature event-registration
Jan 29 10:40:16.734 CST: DS-REG-TRACE: call_home_ds_event_register[658], register event fords "6030"Jan 29 10:40:16.734 CST: DS-REG-TRACE: ds_content_event_reg[515], ds "6030"Jan 29 10:40:16.734 CST: DS-REG-TRACE: ds_event_sig_reg[304], ds "6030", index 0, eventnumber 1Jan 29 10:40:16.734 CST: DS-REG-TRACE: call_home_ds_esid_reg[323], ds "6030", index 0, T =41, S = 3FCHJan 29 10:40:16.738 CST: DS-REG-TRACE: ds_event_sig_reg[343], ds "6030", register callbackto action
Cisco IOS Debug Command Reference - Commands A through D 207
debug backhaul-session-manager session through debug channel packetsdebug call-home diagnostic-signature
.
.
.
The following is sample output from the debug call-home diagnostic-signature parsing command:
Device# debug call-home diagnostic-signature parsing
Jan 29 10:40:16.734 CST: DS-PARSE-TRACE: call_home_ds_signature_verify[387], signaturepassed verificationJan 29 10:40:16.734 CST: DS-REG-TRACE: call_home_ds_update_type_chk[3211], update DS: "6030",update type NEWJan 29 10:40:16.734 CST: DS-REG-TRACE: call_home_ds_content_reparse[3108], reparse ds "6030"contentJan 29 10:40:16.734 CST: DS-PARSE-TRACE: ds_content_var_reparse[2915], reparse ds var in6030Jan 29 10:40:16.734 CST: DS-PARSE-TRACE: ds_sys_var_local_queue_init[2860], copy sys vards_signature_idJan 29 10:40:16.734 CST: DS-PARSE-TRACE: ds_sys_var_local_queue_init[2860], copy sys vards_hostname...
Related Commands DescriptionCommand
Downloads, installs, and uninstalls diagnosticsignature files on a device.
call-home diagnostic-signature
Displays statistics and attributes of a diagnosticsignature file on a device.
show call-home diagnostic-signature statistics
Cisco IOS Debug Command Reference - Commands A through D208
debug backhaul-session-manager session through debug channel packetsdebug call-home diagnostic-signature
debug call-mgmtTo display debugging information for call accounting, including modem and time slot usage, for active andrecent calls, use the debugcall-mgmt command in privileged EXEC mode. To disable debugging output, usethe no form of this command.
debug call-mgmt
no debug call-mgmt
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.1
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Examples The following is sample output after the debugcall-mgmt command has been enabled:
Router# debug call-mgmtCall Management debugging is onRouter#Dec 26 13:57:27.710: msg_to_calls_mgmt: msg type CPM_NEW_CALL_CSM_CONNECT receivedDec 26 13:57:27.714: In actv_c_proc_message,
access type CPM_INSERT_NEW_CALL,call type CPM_ISDN_ANALOG:CSM completed connecting a new modem call
.
.
.Dec 26 13:57:45.906: msg_to_calls_mgmt: msg type CPM_NEW_CALL_ISDN_CONNECT receivedDec 26 13:57:45.906: In actv_c_proc_message,
access type CPM_INSERT_NEW_CALL,call type CPM_ISDN_ANALOG:Added a new ISDN analog call to the active-calls listCC-Slot#7, DSX1-Ctrlr#17, DS0-Timeslot#1Mdm-Slot#1, Mdm-Port#3, TTY#219
.
.
.Dec 26 13:58:25.682: Call mgmt per minute statistics:
active list length: 1history list length: 3
Dec 26 13:58:25.682: 0 timeslots active at slot 7, ctrlr 1Dec 26 13:58:25.682: 0 timeslots active at slot 7, ctrlr 2Dec 26 13:58:25.682: 0 timeslots active at slot 7, ctrlr 3Dec 26 13:58:25.682: 0 timeslots active at slot 7, ctrlr 4
Cisco IOS Debug Command Reference - Commands A through D 209
debug backhaul-session-manager session through debug channel packetsdebug call-mgmt
Dec 26 13:58:25.682: 0 timeslots active at slot 7, ctrlr 5Dec 26 13:58:25.682: 0 timeslots active at slot 7, ctrlr 6Dec 26 13:58:25.682: 0 timeslots active at slot 7, ctrlr 7Dec 26 13:58:25.682: 0 timeslots active at slot 7, ctrlr 8Dec 26 13:58:25.682: 0 timeslots active at slot 7, ctrlr 9Dec 26 13:58:25.682: 0 timeslots active at slot 7, ctrlr 10Dec 26 13:58:25.682: 0 timeslots active at slot 7, ctrlr 11Dec 26 13:58:25.682: 0 timeslots active at slot 7, ctrlr 12Dec 26 13:58:25.682: 0 timeslots active at slot 7, ctrlr 13Dec 26 13:58:25.686: 0 timeslots active at slot 7, ctrlr 14Dec 26 13:58:25.686: 0 timeslots active at slot 7, ctrlr 15Dec 26 13:58:25.686: 0 timeslots active at slot 7, ctrlr 16Dec 26 13:58:25.686: 1 timeslots active at slot 7, ctrlr 17Dec 26 13:58:25.686: 0 timeslots active at slot 7, ctrlr 18Dec 26 13:58:25.686: 0 timeslots active at slot 7, ctrlr 19Dec 26 13:58:25.686: 0 timeslots active at slot 7, ctrlr 20Dec 26 13:58:25.686: 0 timeslots active at slot 7, ctrlr 21Dec 26 13:58:25.686: 0 timeslots active at slot 7, ctrlr 22Dec 26 13:58:25.686: 0 timeslots active at slot 7, ctrlr 23Dec 26 13:58:25.686: 0 timeslots active at slot 7, ctrlr 24Dec 26 13:58:25.686: 0 timeslots active at slot 7, ctrlr 25Dec 26 13:58:25.686: 0 timeslots active at slot 7, ctrlr 26Dec 26 13:58:25.686: 0 timeslots active at slot 7, ctrlr 27Dec 26 13:58:25.686: 0 timeslots active at slot 7, ctrlr 28Router# clear int as1/03Dec 26 13:58:26.538: msg_to_calls_mgmt: msg type CPM_VOICE_CALL_REJ_NO_MOD_AVAIL receivedDec 26 13:58:26.538: In actv_c_proc_message,
access type CPM_REMOVE_DISC_CALL,call type CPM_ISDN_ANALOG:Removed a disconnected ISDN analog callCC-Slot#7, DSX1-Ctrlr#17, DS0-Timeslot#1
Dec 26 13:58:26.538: Mdm-Slot#1, Mdm-Port#3, TTY#219The table below describes the significant fields shown in the display.
Table 41: debug call-mgmt Field Descriptions
DescriptionField
Indicates the arrival of a new call.CPM_NEW_CALL_CSM_CONNECT
Indicates that the new call is an analog ISDN Bchannel call (either a voice call or a call over ananalog modem), rather than a digital (V.110) call.
access type CPM_INSERT_NEW_CALL,
call type CPM_ISDN_ANALOG:
Indicates that the call is connected via the B channelon Serial7/17:1 to the asynchronous modem resource1/03 (interface async1/03, also known as line tty219).
CC-Slot#7, DSX1-Ctrlr#17, DS0-Timeslot#1Mdm-Slot#1, Mdm-Port#3, TTY#219
Displays periodic statistics that give the allocationstate of each DSX1 interface present in the system,as well as the number of current (active) and recent(history) calls.
Dec 26 13:58:25.682: Call mgmt per minute statistics:
active list length: 1
history list length: 3
Indicates that the analog ISDN B channel call hasbeen disassociated from a modem.
Dec 26 13:58:26.538: msg_to_calls_mgmt: msg type
CPM_VOICE_CALL_REJ_NO_MOD_ AVAILreceived
Cisco IOS Debug Command Reference - Commands A through D210
debug backhaul-session-manager session through debug channel packetsdebug call-mgmt
DescriptionField
Indicates that the analog ISDN B channel call hasbeen disconnected.
access type CPM_REMOVE_DISC_CALL,
call type CPM_ISDN_ANALOG:
Removed a disconnected ISDN analog call
Indicates that the call has been disconnected via theB channel on Serial7/17:1 to the asynchronousmodemresource 1/03 (interface async1/03, also known asline tty219).
CC-Slot#7, DSX1-Ctrlr#17, DS0-Timeslot#1
Dec 26 13:58:26.538: Mdm-Slot#1, Mdm-Port#3,TTY#219
Cisco IOS Debug Command Reference - Commands A through D 211
debug backhaul-session-manager session through debug channel packetsdebug call-mgmt
debug call fallback detailTo display details of the call fallback, use the debugcallfallbackdetail command in privileged EXEC mode.To disable debugging output, use the no form of this command.
debug call fallback detail
no debug call fallback detail
Syntax Description This command has no arguments or keywords.
Command Default Disabled
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.1(3)T
This command was implemented on the Cisco AS5850 platform.12.2(2)XB1
This command was implemented on the Cisco 7200 series routers.12.2(4)T
This commandwas implemented on the Cisco 7500 series routers routers.12.2(4)T3
This command was integrated into Cisco IOS Release 12.2(11)T.12.2(11)T
Usage Guidelines Every time a call request is received, the debugcallfallbackdetail command displays in the command-lineinterface (CLI) cache lookup and call acceptance/rejection information. Use this command to monitor callrequests as they enter the call fallback subsystem.
If you have a large amount of calls in your router, enabling this command can cause delays in your routingfunctions as the debug statistics are constantly compiled and sent to your terminal. Also, debug messages onyour terminal may make for difficult CLI configuring.
Examples The following example depicts a call coming in to 10.1.1.4 with codec g729r8. Because there is no cacheentry for this destination, a probe is sent and values are inserted into the cache. A lookup is performed again,entry is found, and a fallback decision is made to admit the call.
Router# debug call fallback detailWhen cache is empty:debug call fallback detail:2d19h:fb_lookup_cache:10.1.1.4, codec:g729r82d19h:fb_lookup_cache:No entry found.2d19h:fb_check:no entry exists, enqueueing probe info... 10.1.1.4, codec:g729r82d19h:fb_main:Got FB_APP_INQ event
Cisco IOS Debug Command Reference - Commands A through D212
debug backhaul-session-manager session through debug channel packetsdebug call fallback detail
2d19h:fb_main:Dequeued prob info: 10.1.1.4, codec:g729r82d19h:fb_lookup_cache:10.1.1.4, codec:g729r82d19h:fb_lookup_cache:No entry found.2d19h:fb_cache_insert:insert:10.1.1.4, codec:g729r82d19h:fb_cache_insert:returning entry:10.1.1.4, codec:g729r82d19h:fb_initiate_probe:Creating probe... 10.1.1.4, codec:g729r82d19h:fb_initiate_probe:Created and started on probe #13, 10.1.1.4, codec:g729r82d19h:fb_lookup_cache:10.1.1.4, codec:g729r82d19h:fb_lookup_cache:Found entry.2d19h:fb_check:returned FB_CHECK_TRUE, 10.1.1.4, codec:g729r82d19h:fb_main:calling callback function with:TRUEThe following example depicts a call coming in to 10.1.1.4 with codec g729r8. A lookup is performed, entryis found, and a fallback decision is made to admit the call.
Router# debug call fallback detailWhen cache is full:2d19h:fb_lookup_cache:10.1.1.4, codec:g729r82d19h:fb_lookup_cache:Found entry.2d19h:fb_check:returned FB_CHECK_TRUE, 10.1.1.4, codec:g729r82d19h:fb_main:calling callback function with:TRUE
Cisco IOS Debug Command Reference - Commands A through D 213
debug backhaul-session-manager session through debug channel packetsdebug call fallback detail
debug call fallback probeTo display details of the call fallback probes, use the debugcallfallbackprobe command in privileged EXECmode. To disable debugging output, use the no form of this command.
debug call fallback probe
no debug call fallback probe
Syntax Description This command has no arguments or keywords.
Command Default Disabled
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.1(3)T
The callfallback and callfallbackreject-cause-code commands wereintroduced.
12.2(2)XA
This command was implemented on the Cisco AS5850 platform.12.2(2)XB1
This command was implemented on the Cisco 7200 series routers.12.2(4)T
This command was implemented on the Cisco 7500 series routers.12.2(4)T3
Usage Guidelines Every time a probe is received, the debugcallfallbackprobe command displays in the command-line interface(CLI) network traffic information collected by the probe. Use this command to monitor the network trafficinformation the probes carry as they enter the call fallback subsystem and log cache entries.
If you have frequent return of probes to your router, enabling this command can cause delays in your routingfunctions as the debug statistics are constantly compiled and sent to your terminal. Also, debug messages onyour terminal may make for difficult CLI configuring.
Examples The following example depicts a call coming in to 10.1.1.4 and codec type g729r8. Because there is no cacheentry for this IP address, a g729r8 probe is initiated. The probe consists of 20 packet returns with an averagedelay of 43 milliseconds. The "jitter out" is jitter from source to destination router and "jitter in" is jitter fromdestination to source router. The delay, loss, and Calculated Planning Impairment Factor (ICPIF) valuesfollowing g113_calc_icpif are the instantaneous values, whereas those values following "New smoothedvalues" are the values after applying the smoothing with weight 65.
Router# debug call fallback probe
Cisco IOS Debug Command Reference - Commands A through D214
debug backhaul-session-manager session through debug channel packetsdebug call fallback probe
2d19h:fb_initiate_probe:Probe payload is 322d19h:fb_main:NumOfRTT=20, RTTSum=120, loss=0, delay=43, jitter in=0, jitter out=0-> 10.1.1.4,codec:g729r82d19h:g113_calc_icpif(delay (w/codec delay)=43, loss=0, expect_factor=10) Icpif=02d19h:fb_main:Probe timer expired, 10.1.1.4, codec:g729r82d19h:fb_main:NumOfRTT=20, RTTSum=120, loss=0, delay=43, jitter in=0, jitter out=0-> 10.1.1.4,codec:g729r82d19h:g113_calc_icpif(delay (w/codec delay)=43, loss=0, expect_factor=10) Icpif=02d19h:fb_main:New smoothed values:inst_weight=65, ICPIF=0, Delay=43, Loss=0 -> 10.1.1.4,codec:g729r8
Cisco IOS Debug Command Reference - Commands A through D 215
debug backhaul-session-manager session through debug channel packetsdebug call fallback probe
debug call filter detailTo display details of the debug trace inside the generic call filter module (GCFM), use the debug call filterdetail command in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug call filter detail
no debug call filter detail
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.3(4)T
Examples The following sample output from the debugcallfilterdetail command shows the detailed activity of theGCFM, which is the internal module that controls the debug filtering.
Router# debug call filter detail5d18h: gcfm_call_get_hash_address: hashtable index = 3455d18h: gcfm_call_search_hash:no found5d18h: gcfm_init_call_record:5d18h: gcfm_init_percall_matchlist:5d18h: === list 1: service_state=2, callp's: 05d18h: gcfm_call_get_hash_address: hashtable index = 3455d18h: gcfm_call_enlist: count before this enlist 0 on 624D60005d18h: gcfm_call_enlist: tail is empty guid=C2E4C789-214A-11D4-804C-000A8A389BA85d18h: gcfm_call_get_hash_address: hashtable index = 3455d18h: gcfm_call_search_hash: search requested guid=C2E4C789-214A-11D4-804C-000A8A389BA8vs the entry guid=C2E4C789-214A-11D4-804C-000A8A389BA85d18h: gcfm_call_search_hash: found5d18h: gcfm_update_percall_condlist_context:5d18h: gcfm_update_percall_condlist_context: check cond = 25d18h: gcfm_copy_match_cond:5d18h: gcfm_update_cond_through_matchlist:5d18h: gcfm_check_percond_with_matchlist: check match-list 15d18h: gcfm_matchlist_percond_check:5d18h: gcfm_matchlist_percond_check: check cond=25d18h: gcfm_matchlist_percond_check: compare 42300 to configured 423005d18h: gcfm_check_cond_tel_number:5d18h: gcfm_check_cond_tel_number: matched5d18h: gcfm_matchlist_percond_check: checked result is 15d18h: gcfm_is_bitfield_identical:5d18h: gcfm_update_cond_through_matchlist: service=1, percallmatchlist tag=1,current_status= 1, service_filter=05d18h: gcfm_percall_notify_condition: not linked call recordThe table below describes the significant fields shown in the display.
Cisco IOS Debug Command Reference - Commands A through D216
debug backhaul-session-manager session through debug channel packetsdebug call filter detail
Table 42: debug call filter detail Field Descriptions
DescriptionField
Shows that the filtering has been initiated.5d18h: gcfm_init_percall_matchlist:
Shows the global unique identifier (GUID) for thecall.
5d18h: gcfm_call_enlist: tail is emptyguid=C2E4C789-214A-11D4-804C-000A8A389BA8
Shows which match list is being checked.5d18h: gcfm_check_percond_with_matchlist:check match-list 1
Shows that the call matched conditions in match list1.
5d18h: gcfm_matchlist_percond_check: checkedresult is 1
Related Commands DescriptionCommand
Displays the debug trace inside the GCFM.debug call filter inout
Runs a filtered debug on a voice call.debug condition match-list
Displays the components used for filtering calls.show call filter components
Cisco IOS Debug Command Reference - Commands A through D 217
debug backhaul-session-manager session through debug channel packetsdebug call filter detail
debug call filter inoutTo display the debug trace inside the generic call filter module (GCFM), use the debug call filter inout commandin privileged EXEC mode. To disable debugging output, use the no form of this command.
debug call filter inout
no debug call filter inout
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.3(4)T
Examples The following sample output from the debugcallfilterinout command shows the incoming and outgoingactivity of the GCFM, which is the internal module that controls the debug filtering.
Router# debug call filter inout5d18h: gcfm_generate_guid:component ISDN gets guid5d18h: gcfm_percall_register:component ISDN5d18h: gcfm_percall_register: component ISDN return selected=05d18h: gcfm_percall_notify_condition:component ISDN for sync=15d18h: gcfm_percall_notify_condition: component ISDN successfully selected = 05d18h: gcfm_check_percall_status:component TGRM5d18h: gcfm_check_percall_status: component TGRM return selected=05d18h: gcfm_check_percall_status: component TGRM5d18h: gcfm_check_percall_status: component TGRM return selected=05d18h: gcfm_percall_register:component VTSP5d18h: gcfm_percall_register: component VTSP for return selected value 05d18h: gcfm_percall_notify_condition: component VTSP for sync=15d18h: gcfm_percall_notify_condition: component VTSP successfully selected = 05d18h: gcfm_percall_register: component CCAPI5d18h: gcfm_percall_register: component CCAPI for return selected value 05d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION return selected=05d18h: gcfm_percall_register: component VOICE-IVR-V25d18h: gcfm_percall_register: component VOICE-IVR-V2 for return selected value 05d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION5d18h: gcfm_check_percall_status: component DIAL-PEER5d18h: gcfm_check_percall_status: component DIAL-PEER return selected=05d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION5d18h: gcfm_check_percall_status: component DIAL-PEER
Cisco IOS Debug Command Reference - Commands A through D218
debug backhaul-session-manager session through debug channel packetsdebug call filter inout
5d18h: gcfm_check_percall_status: component DIAL-PEER return selected=05d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION5d18h: gcfm_check_percall_status: component DIAL-PEER5d18h: gcfm_check_percall_status: component DIAL-PEER return selected=05d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION5d18h: gcfm_check_percall_status: component DIAL-PEER5d18h: gcfm_check_percall_status: component DIAL-PEER return selected=05d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION5d18h: gcfm_check_percall_status: component DIAL-PEER5d18h: gcfm_check_percall_status: component DIAL-PEER return selected=05d18h: gcfm_check_percall_status: component DIAL-PEER5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION5d18h: gcfm_percall_register: component CCAPI5d18h: gcfm_percall_register: component CCAPI for return selected value 05d18h: gcfm_percall_register: component VOICE-IVR-V25d18h: gcfm_percall_register: component VOICE-IVR-V2 for return selected value 05d18h: gcfm_percall_notify_condition: component VOICE-IVR-V2 for sync=15d18h: gcfm_percall_notify_condition: component VOICE-Router#IVR-V2 successfully selected = 15d18h: gcfm_percall_register: component H3235d18h: gcfm_percall_register: component H323 for return selected value 15d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION return selected=15d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION return selected=15d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION return selected=15d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION return selected=15d18h: gcfm_clear_condition:component VOICE-IVR-V25d18h: gcfm_clear_condition: component VOICE-IVR-V2 successfully5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION return selected=05d18h: gcfm_percall_deregister:component CCAPI5d18h: gcfm_percall_deregister: component CCAPI successfully5d18h: gcfm_percall_deregister: component H3235d18h: gcfm_percall_deregister: component H323 successfully5d18h: gcfm_percall_deregister: component ISDN5d18h: gcfm_percall_deregister: component ISDN successfully5d18h: gcfm_percall_deregister: component VOICE-IVR-V25d18h: gcfm_percall_deregister: component VOICE-IVR-V2 successfully5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION5d18h: gcfm_check_percall_status: component NUMBER-TRANSLATION return selected=05d18h: gcfm_percall_deregister: component CCAPI5d18h: gcfm_percall_deregister: component CCAPI successfully5d18h: gcfm_percall_deregister: component VTSP5d18h: gcfm_percall_deregister: component VTSP successfully5d18h: gcfm_percall_deregister: component VOICE-IVR-V25d18h: gcfm_terminate_track_guid:component VOICE-IVR-V2 terminate, success5d18h: gcfm_percall_deregister: component VOICE-IVR-V2 successfullyThe table below describes the significant fields shown in the display.
Table 43: debug call filter inout Field Descriptions
DescriptionField
Shows that a GUID has been generated.gcfm_generate_guid:
Shows components that have been registered for thecall.
gcfm_percall_register:
Shows that a component has been notified of the call.gcfm_percall_notify_condition:
Shows the status of a component of the call.gcfm_check_percall_status:
Cisco IOS Debug Command Reference - Commands A through D 219
debug backhaul-session-manager session through debug channel packetsdebug call filter inout
DescriptionField
Shows that a component has been registered.gcfm_percall_register:
Shows that a condition is cleared for a component.gcfm_clear_condition:
Shows that a component has been deregistered.gcfm_percall_deregister:
Shows that the router is no longer tracking the GUID.gcfm_terminate_track_guid:
Related Commands DescriptionCommand
Displays the details of the debug trace inside theGCFM.
debug call filter detail
Runs a filtered debug on a voice call.debug condition match-list
Displays the components used for filtering calls.show call filter components
Cisco IOS Debug Command Reference - Commands A through D220
debug backhaul-session-manager session through debug channel packetsdebug call filter inout
debug call rsvp-sync eventsTo display events that occur during Resource Reservation Protocol (RSVP) setup, use thedebugcallrsvp-syncevents command in privileged EXEC mode. To disable debugging output, use the noform of this command.
debug call rsvp-sync events
no debug call rsvp-sync events
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.1(3)XI1
This command was integrated into Cisco IOS Release 12.1(5)T.12.1(5)T
This command was implemented on the Cisco AS5850.12.2(2)XB1
Support for the command was implemented in Cisco AS5850 images.12.2(11)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines It is highly recommended that you log the output from the debugcallrsvp-syncevents command to a buffer,rather than sending the output to the console; otherwise, the size of the output could severely impact theperformance of the gateway.
Examples The following example shows a portion of sample output for a call initiating RSVP when using thedebugcallrsvp-syncevents command:
00:03:25: Parameters: localip: 10.19.101.117 :localport: 1666000:03:25: Parameters: remoteip: 10.19.101.116 :remoteport: 1756800:03:25: QoS Primitive Event for Call id 0x1 : QoS Listen00:03:25: Lookup to be done on hashkey 0x1 in hash table 0x61FC249800:03:25: Hashed entry 0x1 in call table 0x61FC249800:03:25: Entry Not found00:03:25: Parameters: localip: 10.19.101.11700:03:25: remoteip: 10.19.101.11600:03:25: QoSpcb : 0x61FC34D800:03:25: Response Status : 0Starting timer for call with CallId 0x1 for 10000 secs00:03:25: Handling QoS Primitive QoS Listen
Cisco IOS Debug Command Reference - Commands A through D 221
debug backhaul-session-manager session through debug channel packetsdebug call rsvp-sync events
00:03:25: Establishing RSVP RESV state : rsvp_request_reservation()00:03:25: For streams from 10.19.101.116:17568 to 10.19.101.117:1666000:03:25: RSVP Confirmation required00:03:25: QoS Primitive Event for Call id 0x1 : QoS Resv00:03:25: Lookup to be done on hashkey 0x1 in hash table 0x61FC249800:03:25: Hashed entry 0x1 in call table 0x61FC249800:03:25: Initiating RVSP PATH messages to be Sent : reg_invoke_rsvp_advertise_sender()00:03:25: Advertizing for streams to 10.19.101.116:17568 from 10.19.101.117:1666000:03:25: RESV notification event received is : 200:03:25: Received RESVCONFIRM00:03:25: RESV CONFIRM message received from 10.19.101.116 for RESV setup from 10.19.101.11700:03:25: RESV event received is : 000:03:25: RESV message received from 10.19.101.116:17568 for streams from 10.19.101.117:1666000:03:25: RESERVATIONS ESTABLISHED : CallId: 1 Stop timer and notify Session Protocolof Success (ie. if notification requested)00:03:25: Invoking spQoSresvCallback with Success
Related Commands DescriptionCommand
Enables synchronization between RSVP and theH.323 voice signaling protocol.
call rsvp-sync
Sets the timer for RSVP reservation setup.call rsvp-sync resv-timer
Displaysmessages about the software functions calledby RSVP synchronization.
debug call rsvp-sync func-trace
Displays the RSVP synchronization configuration.show call rsvp-sync conf
Displays statistics for calls that attempted RSVPreservation.
show call rsvp-sync stats
Cisco IOS Debug Command Reference - Commands A through D222
debug backhaul-session-manager session through debug channel packetsdebug call rsvp-sync events
debug call rsvp-sync func-traceTo display messages about software functions called by Resource Reservation Protocol (RSVP), use thedebugcallrsvp-syncfunc-trace command in privileged EXEC mode. To disable debugging output, use theno form of this command.
debug call rsvp-sync func-trace
no debug call rsvp-sync func-trace
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.1(3)XI1
This command was integrated into Cisco IOS Release 12.1(5)T.12.1(5)T
This command was implemented on the Cisco AS5850.12.2(2)XB1
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines It is highly recommended that you log the output from the debugcallrsvp-syncfunc-trace command to abuffer, rather than sending the output to the console; otherwise, the size of the output could severely impactthe performance of the gateway.
Examples The following example shows a portion of sample output for a call initiating RSVP when using thedebugcallrsvp-syncfunc-trace command in conjunction with the debugcallrsvp-synceventscommand:
00:03:41: Entering Function QoS_Listen00:03:41: Parameters:localip:10.10.101.116 :localport:1756800:03:41:remoteip:10.10.101.117 :remoteport:000:03:41: Entering Function qos_dequeue_event00:03:41: Entering Function process_queue_event00:03:41: QoS Primitive Event for Call id 0x2 :QoS Listen00:03:41: Entering Function get_pcb00:03:41: Entering Function hash_tbl_lookup00:03:41:Lookup to be done on hashkey 0x2 in hash table 0x61FAECD800:03:41: Entering Function hash_func00:03:41:Hashed entry 0x2 in call table 0x61FAECD800:03:41:Entry Not found00:03:41: Entering Function qos_dequeue_pcb00:03:41: Entering Function qos_initialize_pcb
Cisco IOS Debug Command Reference - Commands A through D 223
debug backhaul-session-manager session through debug channel packetsdebug call rsvp-sync func-trace
00:03:41: Parameters:localip:10.10.101.11600:03:41: remoteip:10.10.101.11700:03:41: QoSpcb :0x61FAFD1800:03:41: Response Status :000:03:41: Entering Function hash_tbl_insert_entry00:03:41: Entering Function hash_func00:03:41: Handling QoS Primitive QoS Listen00:03:41: Entering Function qos_dequeue_hash_port_entry00:03:41: Entering Function qos_port_tbl_insert_entry00:03:41: Entering Function hash_func00:03:41: Doing RSVP Listen :rsvp_add_ip_listen_api()
Related Commands DescriptionCommand
Enables synchronization between RSVP and theH.323 voice signaling protocol.
call rsvp-sync
Sets the timer for RSVP reservation setup.call rsvp-sync resv-timer
Displays the events that occur during RSVPsynchronization.
debug call rsvp-sync events
Displays the RSVP synchronization configuration.show call rsvp-sync conf
Displays statistics for calls that attempted RSVPreservation.
show call rsvp-sync stats
Cisco IOS Debug Command Reference - Commands A through D224
debug backhaul-session-manager session through debug channel packetsdebug call rsvp-sync func-trace
debug call thresholdTo see details of the trigger actions, use the debugcallthreshold command in privileged EXEC mode. Todisable debugging output, use the no form of this command.
debug call threshold module
no debug call threshold
Syntax Description The module argument can be one of the following:
• core --Traces the resource information.
• detail --Traces for detail information.
module
Command Default Disabled
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(2)XA
The command was integrated into Cisco IOS Release 12.2(4)T. Support for theCisco AS5300, Cisco AS5350, and Cisco AS5400 is not included in this release.
12.2(4)T
This command was implemented on the Cisco AS5850 platform.12.2(2)XB1
This commandwas integrated into Cisco IOSRelease 12.2(8)T and implementedon Cisco 7200 series routers.
12.2(8)T
Support for this command was implemented on Cisco AS5850, Cisco AS5800,Cisco AS5300, Cisco AS5350, and Cisco AS5400 series images.
12.2(11)T
ExamplesThe following is sample output from the debug call threshold corecommand:Router# debug call threshold coreRSCCAC Core info debugging is onThe following is sample output from the debugcallthresholddetail command:
Router# debug call threshold detailAll RSCCAC info debugging is on
Cisco IOS Debug Command Reference - Commands A through D 225
debug backhaul-session-manager session through debug channel packetsdebug call threshold
debug call treatment actionTo debug the call treatment actions, use the debugcalltreatmentaction command in privileged EXEC mode.To disable debugging output, use the no form of this command.
debug call treatment action
no debug call treatment action
Syntax Description This command has no arguments or keywords.
Command Default Disabled
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(2)XA
The command was integrated into Cisco IOS Release 12.2(4)T.12.2(4)T
This command was implemented on the Cisco AS5850 platform.12.2(2)XB1
This command was integrated into Cisco IOS Release 12.2(8)T andimplemented on Cisco 7200 series routers.
12.2(8)T
Support for this commandwas implemented onCiscoAS5850, CiscoAS5800,Cisco AS5300, Cisco AS5350, and Cisco AS5400 series images.
12.2(11)T
Examples Debug actions are performed on calls by call treatment. The following sample output shows that call treatmentis turned on:
Router# debug call treatment actionCall treatment action debugging is on
Cisco IOS Debug Command Reference - Commands A through D226
debug backhaul-session-manager session through debug channel packetsdebug call treatment action
debug callbackTo display callback events when the router is using a modem and a chat script to call back on a terminal line,use the debugcallback command in privileged EXEC mode. To disable debugging output, use the noformof this command.
debug callback
no debug callback
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines This command is useful for debugging chat scripts on PPP and AppleTalk Remote Access Protocol (ARAP)lines that use callback mechanisms. The output provided by the debugcallback command shows you howthe call is progressing when used with the debugppp or debugarap commands.
Examples The following is sample output from the debugcallback command:
Router# debug callback
TTY7 Callback process initiated, user: exec_test dialstring 123456TTY7 Callback forced wait = 4 secondsTTY7 Exec Callback Successful - await exec/autoselect pickupTTY7: Callback in effect
Related Commands DescriptionCommand
Displays ARAP events.debug cable env
Displays information on traffic and exchanges in aninternetwork implementing the PPP.
debug ppp
Cisco IOS Debug Command Reference - Commands A through D 227
debug backhaul-session-manager session through debug channel packetsdebug callback
debug capf-serverTo collect debug information about the CAPF server, use the debugcapf-server command in privileged EXECmode. To disable collection of debug information, use the no form of this command.
debug capf-server {all| error| events| messages}
no debug capf-server
Syntax Description Collect all CAPF information available.all
Collect only information about CAPF errors.error
Collect only information about CAPF status events.events
Collect only CAPF system messages.messages
Command Default Collection of CAPF debug information is disabled.
Command Modes Privileged EXEC
Command History ModificationCisco IOS Release
This command was introduced.12.4(4)XC
This command was integrated into Cisco IOS Release 12.4(9)T.12.4(9)T
Usage Guidelines This command is used with Cisco Unified CallManager Express phone authentication.
Examples The following example shows debug messages for the CAPF server.
Router# debug capf-server all001891: .Jul 21 18:17:07.014: %IPPHONE-6-UNREGISTER_NORMAL: ephone-1:SEP000E325C9A43IP:10.10.10.194 Socket:3 DeviceType:Phone has unregistered normally.001892: .Jul 21 18:17:20.495: New Connection from phone, socket 1001893: .Jul 21 18:17:20.495: Created New Handshake Process001894: .Jul 21 18:17:20.499: SSL Handshake Error -6983001895: .Jul 21 18:17:21.499: SSL Handshake Error -6983001896: .Jul 21 18:17:22.555: SSL Handshake Successful001897: .Jul 21 18:17:22.555: ephone_capf_send_auth_req:001898: .Jul 21 18:17:22.555: ephone_capf_ssl_write: 12 bytes001899: .Jul 21 18:17:22.711: ephone_capf_ssl_read: Read 35 bytes001900: .Jul 21 18:17:22.711: ephone_capf_handle_phone_msg: msgtype 2001901: .Jul 21 18:17:22.711: ephone_capf_process_auth_res_msg: SEP000E325C9A43 AuthMode 2
Cisco IOS Debug Command Reference - Commands A through D228
debug backhaul-session-manager session through debug channel packetsdebug capf-server
001902: .Jul 21 18:17:22.711: ephone_capf_send_delete_cert_req_msg: SEP000E325C9A43001903: .Jul 21 18:17:22.711: ephone_capf_ssl_write: 8 bytes001904: .Jul 21 18:17:23.891: ephone_capf_ssl_read: Read 12 bytes001905: .Jul 21 18:17:23.891: ephone_capf_handle_phone_msg: msgtype 14001906: .Jul 21 18:17:23.891: certificate delete successful for SEP000E325C9A43001907: .Jul 21 18:17:24.695: ephone_capf_release_session: SEP000E325C9A43001908: .Jul 21 18:17:24.695: ephone_capf_send_end_session_msg: SEP000E325C9A43001909: .Jul 21 18:17:24.695: ephone_capf_ssl_write: 12 bytes001910: .Jul 21 18:17:25.095: %IPPHONE-6-REG_ALARM: 22: Name=SEP000E325C9A43 Load=7.2(2.0)Last=Reset-Reset001911: .Jul 21 18:17:25.099: %IPPHONE-6-REGISTER: ephone-1:SEP000E325C9A43 IP:10.10.10.194Socket:2 DeviceType:Phone has registered.001912: .Jul 21 18:18:05.171: %IPPHONE-6-UNREGISTER_NORMAL: ephone-1:SEP000E325C9A43IP:1.1.1.127 Socket:2 DeviceType:Phone has unregistered normally.001913: .Jul 21 18:18:18.288: New Connection from phone, socket 1001914: .Jul 21 18:18:18.288: Created New Handshake Process001915: .Jul 21 18:18:18.292: SSL Handshake Error -6983001916: .Jul 21 18:18:19.292: SSL Handshake Error -6983001917: .Jul 21 18:18:20.348: SSL Handshake Successful001918: .Jul 21 18:18:20.348: ephone_capf_send_auth_req:001919: .Jul 21 18:18:20.348: ephone_capf_ssl_write: 12 bytes^Z001920: .Jul 21 18:18:20.492: ephone_capf_ssl_read: Read 35 bytes001921: .Jul 21 18:18:20.492: ephone_capf_handle_phone_msg: msgtype 2001922: .Jul 21 18:18:20.492: ephone_capf_process_auth_res_msg: SEP000E325C9A43 AuthMode 2001923: .Jul 21 18:18:20.492: ephone_capf_send_PhKeyGenReq_msg: SEP000E325C9A43 KeySize1024001924: .Jul 21 18:18:20.492: ephone_capf_ssl_write: 13 bytes001925: .Jul 21 18:18:20.540: ephone_capf_ssl_read: Read 8 bytes001926: .Jul 21 18:18:20.540: ephone_capf_handle_phone_msg: msgtype 17001927: .Jul 21 18:18:20.540: ephone_capf_process_req_in_progress: SEP000E325C9A43 delay0sh001928: .Jul 21 18:18:21.924: %SYS-5-CONFIG_I: Configured from console by user1 on console
Cisco IOS Debug Command Reference - Commands A through D 229
debug backhaul-session-manager session through debug channel packetsdebug capf-server
debug casTo debug channel-associated signaling (CAS) messages and to debug the establishment of a time-divisionmultiplexing (TDM) connection between a DS0 and a digital modem, use the debugcas command in privilegedEXEC mode. To disable debugging output, use the no form of this command.
debug cas slot slot number port port number
no debug cas slot slot number port port number
Syntax Description Slot and slot number. Valid values are 0 and 1.slot slot number
Port and port number. Valid values are 0 and 1.port port number
Command Default Disabled
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced for the Cisco AS5200 and AS5300 platforms.12.0(7)T
This commandwas integrated into Cisco IOSRelease 12.2(2)T and support wasadded for the Cisco 2600 series and Cisco 3600 series platforms.
12.2(2)T
This command was integrated into Cisco IOS Release 12.3(1) and support wasadded for the Cisco 2600 XM series, Cisco 2691, and Cisco 3700 seriesplatforms.
12.3(1)
This command was integrated into Cisco IOS Release 12.3(4)T.12.3(4)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines When the NM-xCE1T1PRI network module is used with an NM-xDM and a DS0-group is configured underthe controller, you can use the debugcas command to debug CAS signaling messages and the establishmentof a TDM connection between a DS0 and a digital modem. Use the debugcas command to identify andtroubleshoot call connection problems on a T1/E1 interface. With this command, you can trace the completesequence of incoming and outgoing calls.
Cisco IOS Debug Command Reference - Commands A through D230
debug backhaul-session-manager session through debug channel packetsdebug cas
Examples The following shows an example session to enable debugging CAS and generate troubleshooting output:
Router# show debug
Router# debug cas slot 1 port 0
CAS debugging is onRouter#debug-cas is on at slot(1) dsx1(0)Router# show debug
CAS debugging is onThe following example shows output for the first outgoing call:
Router# p 1.1.1.2Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 1.1.1.2, timeout is 2 seconds:*Mar 2 00:17:45: dsx1_alloc_cas_channel: channel 0 dsx1_timeslot1(0/0): TX SEIZURE (ABCD=0001)(0/0): RX SEIZURE_ACK (ABCD=1101)(0/1):RX_IDLE (ABCD=1001)(0/2): RX_IDLE (ABCD=1001)(0/3): RX_IDLE(ABCD=1001)(0/4): RX_IDLE (ABCD=1001)(0/5): RX_IDLE (ABCD=1001)(0/6):RX_IDLE (ABCD=1001)(0/7): RX_IDLE (ABCD=1001)(0/8): RX_IDLE(ABCD=1001)(0/9): RX_IDLE (ABCD=1001)(0/10): RX_IDLE (ABCD=1001)(0/11):RX_IDLE (ABCD=1001)(0/12): RX_IDLE (ABCD=1001)(0/13): RX_IDLE(ABCD=1001)(0/14): RX_IDLE (ABCD=1001)(0/16): RX_IDLE (ABCD=1001)(0/17):RX_IDLE (ABCD=1001)(0/18): RX_IDLE (ABCD=1001)(0/19): RX_IDLE(ABCD=1001)(0/20): RX_IDLE (ABCD=1001)(0/21): RX_IDLE(ABCD=1001).(0/22): RX_IDLE (ABCD=1001)(0/23): RX_IDLE(ABCD=1001)(0/24): RX_IDLE (ABCD=1001)(0/25): RX_IDLE (ABCD=1001)(0/26):RX_IDLE (ABCD=1001)(0/27): RX_IDLE (ABCD=1001)(0/28): RX_IDLE(ABCD=1001)(0/29): RX_IDLE (ABCD=1001)(0/30): RX_IDLE(ABCD=1001)...(0/0): RX ANSWERED (ABCD=0101).Success rate is 0 percent (0/5)Router#*Mar 2 00:18:13.333: %LINK-3-UPDOWN: Interface Async94, changed state to up*Mar 2 00:18:13.333: %DIALER-6-BIND: Interface As94 bound to profile Di1*Mar 2 00:18:14.577: %LINEPROTO-5-UPDOWN: Line protocol on Interface Async94, changed stateto upRouter# p 1.1.1.2Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 1.1.1.2, timeout is 2 seconds:!!!!!Success rate is 100 percent (5/5), round-trip min/avg/max = 160/180/236 msThe following example shows that the call is cleared on the router:
Router# clear int dialer 1Router#(0/0): TX IDLE (ABCD=1001)(0/0): RX IDLE (ABCD=1001)*Mar 2 00:18:28.617: %LINK-5-CHANGED: Interface Async94, changed state to reset*Mar 2 00:18:28.617: %DIALER-6-UNBIND: Interface As94 unbound from profile Di1*Mar 2 00:18:29.617: %LINEPROTO-5-UPDOWN: Line protocol on Interface Async94, changed stateto downet2-c3745-1#*Mar 2 00:18:33.617: %LINK-3-UPDOWN: Interface Async94, changed state to downThe following example shows a subsequent outbound CAS call:
Router# p 1.1.1.2Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 1.1.1.2, timeout is 2 seconds:*Mar 2 00:18:40: dsx1_alloc_cas_channel: channel 5 dsx1_timeslot6(0/5): TX SEIZURE (ABCD=0001)(0/5): RX SEIZURE_ACK(ABCD=1101)....(0/5): RX ANSWERED (ABCD=0101).Success rate is 0 percent (0/5)Router#*Mar 2 00:19:08.841: %LINK-3-UPDOWN: Interface Async93, changed state to up*Mar 2 00:19:08.841: %DIALER-6-BIND: Interface As93 bound to profile Di1
Cisco IOS Debug Command Reference - Commands A through D 231
debug backhaul-session-manager session through debug channel packetsdebug cas
*Mar 2 00:19:10.033: %LINEPROTO-5-UPDOWN: Line protocol on Interface Async93, changed stateto upRouter# p 1.1.1.2Type escape sequence to abort.Sending 5, 100-byte ICMP Echos to 1.1.1.2, timeout is 2 seconds:!!!!!Success rate is 100 percent (5/5), round-trip min/avg/max = 160/167/176msThe following example shows the call cleared by the switch:
Router#(0/5): TX IDLE (ABCD=1001)(0/5): RX IDLE (ABCD=1001)*Mar 2 00:19:26.249: %LINK-5-CHANGED: Interface Async93, changed state to reset*Mar 2 00:19:26.249: %DIALER-6-UNBIND: Interface As93 unbound from profile Di1*Mar 2 00:19:27.249: %LINEPROTO-5-UPDOWN: Line protocol on Interface Async93, changed stateto downRouter#*Mar 2 00:19:31.249: %LINK-3-UPDOWN: Interface Async93, changed state to downThe following example shows an incoming CAS call:
Router#(0/0): RX SEIZURE (ABCD=0001)*Mar 2 00:22:40: dsx1_alloc_cas_channel: channel 0 dsx1_timeslot1(0/0): TX SEIZURE_ACK (ABCD=1101)(0/0): TX ANSWERED (ABCD=0101)Router#*Mar 2 00:23:06.249: %LINK-3-UPDOWN: Interface Async83, changed state to up*Mar 2 00:23:06.249: %DIALER-6-BIND: Interface As83 bound to profile Di1*Mar 2 00:23:07.653: %LINEPROTO-5-UPDOWN: Line protocol on Interface Async83, changed stateto up
Related Commands DescriptionCommand
Displays information about the types of debuggingthat are enabled for your router.
show debug
Cisco IOS Debug Command Reference - Commands A through D232
debug backhaul-session-manager session through debug channel packetsdebug cas
debug ccaal2 sessionTo display the ccaal2 function calls during call setup and teardown, use the debugccaal2sessioncommand inprivileged EXEC mode. To disable debugging output, use the no form of this command.
debug ccaal2 session
no debug ccaal2 session
Syntax Description This command has no arguments or keywords.
Command Default Debugging for ATM Adaptation Layer type 2 (AAL2) sessions is not enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced for the Cisco MC3810 series.12.1(1)XA
This command was integrated in Cisco IOS Release 12.1(2)T.12.1(2)T
Support for this command was implemented on the Cisco 7200 seriesrouters.
12.2(2)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines Use this command when troubleshooting an AAL2 trunk setup or teardown problem.
Examples The following example shows sample output from the debugccaal2sessioncommand for a forced shutdownof a voice port:
Router# debug ccaal2 sessionCCAAL2 Session debugging is onRouter# configure terminalEnter configuration commands, one per line. End with CNTL/Z.Router(config)# voice-port 2/0:0Router(config-voiceport)# shutdown00:32:45:ccaal2_call_disconnect:peer tag 000:32:45:ccaal2_evhandle_call_disconnect:Entered00:32:45:ccaal2_call_cleanup:freeccb 1, call_disconnected 100:32:45:starting incoming timer:Setting accept_incoming to FALSE and00:32:45:timer 2:(0x622F6270)starts - delay (70000)00:32:45:ccaal2_call_cleanup:Generating Call record00:32:45:cause=81 tcause=81 cause_text=unspecified00:32:45:ccaal2_call_cleanup:ccb 0x63FF1700, vdbPtr 0x62DFF2E0
freeccb_flag=1, call_disconnected_flag=100:32:45:%LINK-3-UPDOWN:Interface recEive and transMit2/0:0(1),changed state to Administrative Shutdown
Cisco IOS Debug Command Reference - Commands A through D 233
debug backhaul-session-manager session through debug channel packetsdebug ccaal2 session
The following example shows sample output from the debugccaal2sessioncommand for a trunk setup on avoice port:
Router# debug ccaal2 sessionRouter(config-voiceport)# no shutdownRouter(config-voiceport)#00:35:28:%LINK-3-UPDOWN:Interface recEive and transMit2/0:0(1),changed state to up00:35:35:ccaal2_call_setup_request:Entered00:35:35:ccaal2_evhandle_call_setup_request:Entered00:35:35:ccaal2_initialize_ccb:preferred_codec set(-1)(0)00:35:35:ccaal2_evhandle_call_setup_request:preferred_codecset(5)(40). VAD is 100:35:35:ccaal2_call_setup_trunk:subchannel linkingsuccessfulccaal2_receive:xmitFunc is NULL00:35:35:ccaal2_caps_ind:PeerTag = 4900:35:35: codec(preferred) = 1, fax_rate = 2, vad = 200:35:35: cid = 56, config_bitmask = 258, codec_bytes = 40,
signal_type=800:35:36:%HTSP-5-UPDOWN:Trunk port(channel) [2/0:0(1)] is upRouter(config-voiceport)#
Related Commands DescriptionCommand
Shows which debug commands are enabled.show debug
Cisco IOS Debug Command Reference - Commands A through D234
debug backhaul-session-manager session through debug channel packetsdebug ccaal2 session
debug cce dp named-db urlfilterTo enable debug information of the Common Classification Engine Data-Plane (CCE DP) URL FilteringClassificationmodule, use the debugccedpnamed-dburlfilter command in privileged EXECmode. To disabledebugging output, use the no form of this command.
debug cce dp named-db urlfilter
no debug cce dp named-db urlfilter
Syntax Description This command has no keywords or arguments.
Command Default No debugging information is generated for the the CCE DP URL Filtering Classification module.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.4(15)XZ
This command was integrated into Cisco IOS Release 12.4(20)T.12.4(20)T
Examples The following is sample output from the debugccedpnamed-dburlfiltercommand at the time that a URLrequest to the untrusted domain www.example.com was made:
Router# debug cce dp named-db urlfilterCCE DP Named DB URLF functionality debugging is onRouter#*Apr 4 10:38:08.043: CCE* FUNC: cce_dp_named_db_urlf_pkt_classify -- Didn't get token*Apr 4 10:38:08.043: CCE* FUNC: cce_dp_urlf_truncate_url -- Truncating URL upto scriptbefore sending to the trend for classification*Apr 4 10:38:08.043: CCE* FUNC: urlf_trend_find_cache_entry -- The host tree in bucket1248 is empty*Apr 4 10:38:08.043: CCE* FUNC: cce_dp_named_db_urlf_pkt_classify -- Didn't find in cache*Apr 4 10:38:08.051: CCE FUNC: urlf_trend_store_response -- Host node with given domainname not found.*Apr 4 10:38:08.051: CCE FUNC: urlf_trend_store_response -- Create domain type cacheentry.*Apr 4 10:38:08.051: CCE FUNC: cache_size_limit_check -- New cache size=73, existing cachesize=0, cache size limit=131072000*Apr 4 10:38:08.051: CCE FUNC: create_domain_cache_entry -- Domain cache entry 0x65EE0ED0created.*Apr 4 10:38:08.051: CCE FUNC: create_and_insert_domain_cache_entry --*Apr 4 10:38:08.051: Domain cache entry 0x65EE0ED0 created and inserted into host treewith root=0x65EE0ED0, root left=0x0, root right=0x0; new node left=0x0, new node right=0x0*Apr 4 10:38:08.051: CCE FUNC: cce_dp_named_db_urlf_gen_match_token -- pushing match-infotoken - class 0xC000000E; filter 45; category 21*Apr 4 10:38:08.051: CCE FUNC: cce_dp_named_db_urlf_non_pkt_classify -- Class 0x65C5D484matched*Apr 4 17:38:08.051: %URLF-4-URL_BLOCKED: Access denied URL 'http://www.example.com/',client 1.0.0.118:3056 server 192.168.0.30:8080
Cisco IOS Debug Command Reference - Commands A through D 235
debug backhaul-session-manager session through debug channel packetsdebug cce dp named-db urlfilter
*Apr 4 10:38:08.055: CCE* FUNC: cce_dp_named_db_urlf_pkt_classify -- Didn't get token*Apr 4 10:38:08.055: CCE FUNC: cce_dp_named_db_urlf_pkt_classify -- Didn't get token
Cisco IOS Debug Command Reference - Commands A through D236
debug backhaul-session-manager session through debug channel packetsdebug cce dp named-db urlfilter
debug ccfrf11 sessionTo display the ccfrf11 function calls during call setup and teardown, use the debugccfrf11session commandin privileged EXEC mode. To disable debugging output, use the noform of this command.
debug ccfrf11 session
no debug ccfrf11 session
Syntax Description This command has no keywords or arguments.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced for the Cisco 2600 and Cisco 3600 seriesrouters.
12.0(3)XG
This command was integrated into Cisco IOS Release 12.0(4)T.12.0(4)T
This command was first supported on the Cisco MC3810 series.12.0(7)XK
Support for this command was implemented in Cisco MC3810 images.12.1(2)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines Use this command to display debug information about the various FRF.11 VoFR service provider interface(SPI) functions. Note that this debug command does not display any information regarding the proprietaryCisco switched-VoFR SPI.
This debug is useful only when the session protocol is "frf11-trunk."
Examples The following is sample output from the debugccfrf11session command:
Router# debug ccfrf11 sessionINCOMING CALL SETUP (port setup for answer-mode):*Mar 6 18:04:07.693:ccfrf11_process_timers:scb (0x60EB6040) timer (0x60EB6098) expired*Mar 6 18:04:07.693:Setting accept_incoming to TRUE*Mar 6 18:04:11.213:ccfrf11_incoming_request:peer tag 800:callingNumber=+2602100,
calledNumber=+3622110*Mar 6 18:04:11.213:ccfrf11_initialize_ccb:preffered_codec set(-1)(0)*Mar 6 18:04:11.213:ccfrf11_evhandle_incoming_call_setup_request:calling +2602100,
called +3622110 Incoming Tag 800*Mar 6 18:04:11.217:ccfrf11_caps_ind:PeerTag = 800*Mar 6 18:04:11.217: codec(preferred) = 4, fax_rate = 2, vad = 2*Mar 6 18:04:11.217: cid = 30, config_bitmask = 0, codec_bytes = 20, signal_type=2*Mar 6 18:04:11.217: required_bandwidth 8192*Mar 6 18:04:11.217:ccfrf11_caps_ind:Bandwidth reservation of 8192 bytes succeeded.*Mar 6 18:04:11.221:ccfrf11_evhandle_call_connect:Entered
Cisco IOS Debug Command Reference - Commands A through D 237
debug backhaul-session-manager session through debug channel packetsdebug ccfrf11 session
CALL SETUP (MASTER):5d22h:ccfrf11_call_setup_request:Entered5d22h:ccfrf11_evhandle_call_setup_request:Entered5d22h:ccfrf11_initialize_ccb:preffered_codec set(-1)(0)5d22h:ccfrf11_evhandle_call_setup_request:preffered_codec set(9)(24)5d22h:ccfrf11_call_setup_trunk:subchannel linking successful5d22h:ccfrf11_caps_ind:PeerTag = 8105d22h: codec(preferred) = 512, fax_rate = 2, vad = 25d22h: cid = 30, config_bitmask = 1, codec_bytes = 24, signal_type=25d22h: required_bandwidth 65005d22h:ccfrf11_caps_ind:Bandwidth reservation of 6500 bytes succeeded.CALL TEARDOWN:*Mar 6 18:09:14.805:ccfrf11_call_disconnect:peer tag 0*Mar 6 18:09:14.805:ccfrf11_evhandle_call_disconnect:Entered*Mar 6 18:09:14.805:ccfrf11_call_cleanup:freeccb 1, call_disconnected 1*Mar 6 18:09:14.805:ccfrf11_call_cleanup:Setting accept_incoming to FALSE and starting
incoming timer*Mar 6 18:09:14.809:timer 2:(0x60EB6098)starts - delay (70000)*Mar 6 18:09:14.809:ccfrf11_call_cleanup:Alive timer stopped*Mar 6 18:09:14.809:timer 1:(0x60F64104) stops*Mar 6 18:09:14.809:ccfrf11_call_cleanup:Generating Call record*Mar 6 18:09:14.809:cause=10 tcause=10 cause_text="normal call clearing."*Mar 6 18:09:14.809:ccfrf11_call_cleanup:Releasing 8192 bytes of reserved bandwidth*Mar 6 18:09:14.809:ccfrf11_call_cleanup:ccb 0x60F6404C, vdbPtr 0x610DB7A4
freeccb_flag=1, call_disconnected_flag=1
Related Commands DescriptionCommand
Displays the ccswvoice function calls during callsetup and teardown.
debug call rsvp-sync events
Displays the ccswvoice function calls during callsetup and teardown.
debug ccswvoice vofr-session
Displays the first 10 bytes (including header) ofselected VoFR subframes for the interface.
debug vtsp session
Cisco IOS Debug Command Reference - Commands A through D238
debug backhaul-session-manager session through debug channel packetsdebug ccfrf11 session
debug cch323To provide debugging output for various components within the H.323 subsystem, use thedebugcch323commandinprivilegedEXECmode.To disable debugging output, use the noform of thiscommand.
debug cch323 {all| error| h225| h245| nxe| ras| rawmsg| session}
no debug cch323
Syntax Description Enables all debug cch323 commands.all
Traces errors encountered in the H.323 subsystemand can be used to help troubleshoot problems withH.323 calls.
error
Traces the state transition of the H.225 state machineon the basis of the processed event.
h225
Traces the state transition of the H.245 state machineon the basis of the processed events.
h245
Displays Annex E events that have been transmittedand received.
nxe
Traces the state transition of the Registration,Admission, and Status (RAS) state machine on thebasis of the processed events.
ras
Troubleshoots raw message buffer problems.rawmsg
Traces general H.323 events and can be used totroubleshoot H.323 problems.
session
Command Modes Privileged EXEC
Command History ModificationRelease
The debug cch323 command and the following keywords were introduced:h225, h245, and ras.
11.3(6)NA2
The nxe keyword was added.12.2(2)XA
Cisco IOS Debug Command Reference - Commands A through D 239
debug backhaul-session-manager session through debug channel packetsdebug cch323
ModificationRelease
The following keywords were introduced: all, error, rawmsg, and session. Thenxe keyword was integrated into Cisco IOS Release 12.2(4)T on all CiscoH.323 platforms. This command does not support the Cisco access serverplatforms in this release.
12.2(4)T
This command was implemented on the Cisco AS5850.12.2(2)XB1
Usage Guidelines The debug cch323 Command with the all Keyword
When used with the debugcch323 command, the all keyword provides debug output for various componentswithin the H.323 subsystem.
The debugcch323 command used with the all keyword enables the following debugcch323 commands:
Enables a CCH323 Service Provider Interface (SPI)trace.
error
Enables an H225 state machine debugging trace.h225
Enables an H245 state machine debugging trace.h245
Enables an Annex E debugging trace.nxe
Enables a RAS state machine debugging trace.ras
Enables a CCH323 RAWMSG debugging trace.rawmsg
Enables a Session debugging trace.session
Using the debugcch323all command could slow your system and flood the TTY if there is significantcall traffic.
Caution
The debug cch323 Command with the error Keyword
When used with the debugcch323 command, the error keyword allows you to trace errors encountered inthe H.323 subsystem.
There is little or no output from this command when there is a stable H.323 network.Note
The debug cch323 Command with the h225 Keyword
When used with the debugcch323 command, the h225 keyword allows you to trace the state transition of theH.225 state machine on the basis of the processed event.
The definitions of the different states of the H.225 state machine follow:
Cisco IOS Debug Command Reference - Commands A through D240
debug backhaul-session-manager session through debug channel packetsdebug cch323
• H225_IDLE--This is the initial state of the H.225 state machine. The H.225 state machine is in this statebefore issuing a call setup request (for the outbound IP call case) or when ready to receive an incomingIP call.
• H225_SETUP--This is the call setup state. The state machine changes to this state after sending out acall setup request or after receiving an incoming call indication.
• H225_ALERT--This is the call alerting state. The state machine changes to this state after sending thealerting message or after receiving an alerting message from the peer.
• H225_CALLPROC--This is the call proceeding state.
• H225_ACTIVE--This is the call connected state. In this state, the call is active. The state machine changesto this state after sending the connect message to the peer or after receiving the connect message fromthe peer.
• H225_WAIT_FOR_ARQ--This is the state in which the H.225 state machine is waiting for the completionof the Admission Request (ARQ) process from the RAS state machine.
• H225_WAIT_FOR_DRQ--This is the state in which the H.225 state machine is waiting for the completionof the Disengage Request (DRQ) process from the RAS state machine.
• H225_WAIT_FOR_H245--This is the state in which the H.225 state machine is waiting for the successor failure from the H.245 state machine.
The definitions of the different events of the H.225 state machine follow:
• H225_EVENT_NONE--There is no event.
• H225_EVENT_ALERT--This event instructs the H.225 state machine to send an alert message to thepeer.
• H225_EVENT_ALERT_IND--This event indicates to the H.225 state machine that an alert messagearrived from the peer.
• H225_EVENT_CALLPROC--This event instructs the H.225 state machine to send a call proceedingmessage to the peer.
• H225_EVENT_CALLPROC_IND--This event indicates to the H.225 statemachine that a call proceedingmessage has been received from the peer.
• H225_EVENT_REJECT--This event instructs the H.225 state machine to reject the call setup requestfrom the peer.
• H225_EVENT_REJECT_IND--This event indicates to the H.225 state machine that a call setup requestto the peer has been rejected.
• H225_EVENT_RELEASE--This event instructs the H.225 state machine to send a release completemessage to the peer.
• H225_EVENT_RELEASE_IND--This event indicates to the H.225 state machine that a release completemessage has been received from the peer.
• H225_EVENT_SETUP--This event instructs the H.225 state machine to send a setup message to thepeer.
• H225_EVENT_SETUP_IND--This event indicates to the H.225 state machine that a setup message hasbeen received from the peer.
Cisco IOS Debug Command Reference - Commands A through D 241
debug backhaul-session-manager session through debug channel packetsdebug cch323
• H225_EVENT_SETUP_CFM--This event instructs the H.225 state machine to send a connect messageto the peer.
• H225_EVENT_SETUP_CFM_IND--This event indicates to the H.225 state machine that a connectmessage arrived from the peer.
• H225_EVENT_RAS_SUCCESS--This event indicates to the H.225 state machine that the pending RASoperation succeeded.
• H225_EVENT_RAS_FAILED--This event indicates to the H.225 state machine that the pending RASoperation failed.
• H225_EVENT_H245_SUCCESS--This event indicates to the H.225 state machine that the pendingH.245 operation succeeded.
• H225_EVENT_H245_FAILED--This event indicates to the H.225 state machine that the pending H.245operation failed.
The debug cch323 Command with the h245 Keyword
When used with the debugcch323 command, the h245 keyword allows you to trace the state transition of theH.245 state machine on the basis of the processed event.
The H.245 state machines include the following three state machines:
• Master slave determination (MSD) state machine
• Capability exchange (CAP) state machine
• Open logical channel (OLC) state machine
The state definitions follow:
• H245_MS_NONE--This is the initial state of the MSD state machine.
• H245_MS_WAIT--In this state, an MSD message is sent, and the device is waiting for the reply.
• H245_MS_DONE-- The result is in.
• H245_CAP_NONE--This is the initial state of the CAP state machine.
• H245_CAP_WAIT--In this state, a CAP message is sent, and the device is waiting for the reply.
• H245_CAP_DONE--The result is in.
• H245_OLC_NONE--This is the initial state of the OLC state machine.
• H245_OLC_WAIT--In this state, an OLC message is sent, and the device is waiting for the reply.
• H245_OLC_DONE--The result is in.
The event definitions follow:
• H245_EVENT_MSD--Send MSD message.
• H245_EVENT_MS_CFM--Send MSD acknowledge message.
• H245_EVENT_MS_REJ--Send MSD reject message.
• H245_EVENT_MS_IND--Received MSD message.
• H245_EVENT_CAP--Send CAP message.
Cisco IOS Debug Command Reference - Commands A through D242
debug backhaul-session-manager session through debug channel packetsdebug cch323
• H245_EVENT_CAP_CFM--Send CAP acknowledge message.
• H245_EVENT_CAP_REJ--Send CAP reject message.
• H245_EVENT_CAP_IND--Received CAP message.
• H245_EVENT_OLC--Send OLC message.
• H245_EVENT_OLC_CFM--Send OLC acknowledge message.
• H245_EVENT_OLC_REJ--Send OLC reject message.
• H245_EVENT_OLC_IND--Received OLC message.
The debug cch323 Command with the nxe Keyword
When used with the debugcch323 command, the nxe keyword allows you to display the Annex E events thathave been transmitted and received.
The debug cch323 Command with the ras Keyword
When used with the debugcch323 command, the ras keyword allows you to trace the state transition of theRAS state machine based on the processed events.
RAS operates in two state machines. One global state machine controls the overall RAS operation of thegateway. The other state machine is a per-call state machine that controls the active calls.
The definitions of the different states of the RAS state machine follow:
• CCH323_RAS_STATE_NONE--This is the initial state of the RAS state machine.
• CCH323_RAS_STATE_GRQ--The state machine is in the Gatekeeper Request (GRQ) state. In thisstate, the gateway is discovering a gatekeeper.
• CCH323_RAS_STATE_RRQ--The state machine is in the Registration Request (RRQ) state. In thisstate, the gateway is registering with a gatekeeper.
• CCH323_RAS_STATE_IDLE--The global state machine is in the idle state.
• CCH323_RAS_STATE_URQ--The state machine is in the Unregistration Request (URQ) state. In thisstate, the gateway is in the process of unregistering with a gatekeeper.
• CCH323_RAS_STATE_ARQ--The per-call state machine is in the process of admitting a new call.
• CCH323_RAS_STATE_ACTIVE--The per-call state machine is in the call active state.
• CCH323_RAS_STATE_DRQ--The per-call state machine is in the process of disengaging an activecall.
The definitions of the different events of the RAS state machine follow:
• CCH323_RAS_EVENT_NONE--Nothing.
• CCH323_RAS_EVENT_GWUP--Gateway is coming up.
• CCH323_RAS_EVENT_GWDWN--Gateway is going down.
• CCH323_RAS_EVENT_NEWCALL--New call.
• CCH323_RAS_EVENT_CALLDISC--Call disconnect.
• CCH323_RAS_EVENT_GCF--Received Gatekeeper Confirmation (GCF).
• CCH323_RAS_EVENT_GRJ--Received Gatekeeper Rejection (GRJ).
Cisco IOS Debug Command Reference - Commands A through D 243
debug backhaul-session-manager session through debug channel packetsdebug cch323
• CCH323_RAS_EVENT_ACF--Received Admission Confirmation (ACF).
• CCH323_RAS_EVENT_ARJ--Received Admission Reject (ARJ).
• CCH323_RAS_EVENT_SEND_RRQ--Send Registration Request (RRQ).
• CCH323_RAS_EVENT_RCF--Received Registration Confirmation (RCF).
• CCH323_RAS_EVENT_RRJ--Received Registration Rejection (RRJ).
• CCH323_RAS_EVENT_SEND_URQ--Send Unregistration Request (URQ).
• CCH323_RAS_EVENT_URQ--Received URQ.
• CCH323_RAS_EVENT_UCF--Received Unregister Confirmation (UCF).
• CCH323_RAS_EVENT_SEND_UCF--Send UCF.
• CCH323_RAS_EVENT_URJ--Received Unregister Reject (URJ).
• CCH323_RAS_EVENT_BCF--Received Bandwidth Confirm (BCF).
• CCH323_RAS_EVENT_BRJ--Received Bandwidth Rejection (BRJ).
• CCH323_RAS_EVENT_DRQ--Received Disengage Request (DRQ).
• CCH323_RAS_EVENT_DCF--Received Disengage Confirm (DCF).
• CCH323_RAS_EVENT_SEND_DCF--Send DCF.
• CCH323_RAS_EVENT_DRJ--Received Disengage Reject (DRJ).
• CCH323_RAS_EVENT_IRQ--Received Interrupt Request (IRQ).
• CCH323_RAS_EVENT_IRR--Send Information Request (IRR).
• CCH323_RAS_EVENT_TIMEOUT--Message timeout.
The debug cch323 Command with the rawmsg Keyword
When used with the debugcch323 command, the rawmsg keyword allows you to troubleshoot raw messagebuffer problems.
Using the debugcch323 command with the rawmsg keyword could slow your system and flood the TTYif there is significant call traffic.
Caution
The debug cch323 Command with the session Keyword
Used with the debugcch323 command, the session keyword allows you to trace general H.323 events.
Using the debugcch323session command could slow your system and flood the TTY if there is significantcall traffic.
Caution
Examples
Examples The debugcch323all command and keyword combination provides output for the following keywords: error,h225, h245, nxe, ras, rawmsg, and session. Examples of output for each keyword follow.
Cisco IOS Debug Command Reference - Commands A through D244
debug backhaul-session-manager session through debug channel packetsdebug cch323
Examples The following is sample output from a typical debugcch323error request on a Cisco 3640 router:
Router# debug cch323 errorcch323_h225_receiver:received msg of unknown type 5
Examples The following is sample output from a typical debugcch323h225 request on a Cisco 3640 router:
Router# debug cch323 h22520:59:17:Set new event H225_EVENT_SETUP20:59:17:H225 FSM:received event H225_EVENT_SETUP while at state H225_IDLE20:59:17:Changing from H225_IDLE state to H225_SETUP state20:59:17:cch323_h225_receiver:received msg of type SETUPCFM_CHOSEN20:59:17:H225 FSM:received event H225_EVENT_SETUP_CFM_IND while at stateH225_SETUP20:59:17:Changing from H225_SETUP state to H225_ACTIVE state20:59:17:Set new event H225_EVENT_H245_SUCCESS20:59:17:H225 FSM:received event H225_EVENT_H245_SUCCESS while at stateH225_ACTIVE20:59:20:Set new event H225_EVENT_RELEASE20:59:20:H225 FSM:received event H225_EVENT_RELEASE while at stateH225_ACTIVE20:59:20:Changing from H225_ACTIVE state to H225_WAIT_FOR_DRQ state20:59:20:Set new event H225_EVENT_RAS_SUCCESS20:59:20:H225 FSM:received event H225_EVENT_RAS_SUCCESS while at stateH225_WAIT_FOR_DRQ20:59:20:Changing from H225_WAIT_FOR_DRQ state to H225_IDLE state
The table below describes the significant fields shown in the display.
Table 44: debug cch323 h225 Field Descriptions
DescriptionField
This event instructs the H.225 state machine to senda setup message to the peer.
H225_EVENT_SETUP
The initial state of the H.225 state machine. TheH.225 state machine is in this state before issuing acall setup request (for the outbound IP call case) orwhen ready to receive an incoming IP call.
H225_IDLE
The call setup state. The state machine changes tothis state after sending out a call setup request or afterreceiving an incoming call indication.
H225_SETUP
The H225 connect message that has been receivedfrom a remote H323 endpoint.
SETUPCFM_CHOSEN
This event indicates to the H.225 state machine thata connect message arrived from the peer.
H225_EVENT_SETUP_CFM_IND
The call connected state. In this state, the call isactive. The state machine changes to this state aftersending the connect message to the peer or afterreceiving the connect message from the peer.
H225_ACTIVE
Cisco IOS Debug Command Reference - Commands A through D 245
debug backhaul-session-manager session through debug channel packetsdebug cch323
DescriptionField
This event indicates to the H.225 state machine thatthe pending H.245 operation succeeded.
H225_EVENT_H425_SUCCESS
This event instructs the H.225 state machine to senda release complete message to the peer.
H225_EVENT_RELEASE
The state in which the H.225 state machine is waitingfor the completion of the DRQ process from the RASstate machine.
H225_WAIT_FOR_DRQ
This event indicates to the H.225 state machine thatthe pending RAS operation succeeded.
H225_EVENT_RAS_SUCCESS
The finite state machine.H225 FSM
Examples The following is sample output from a typical debugcch323h245 request on a Cisco 3640 router:
Router# debug cch323 h24520:58:23:Changing to new event H245_EVENT_MSD20:58:23:H245 MS FSM:received event H245_EVENT_MSD while at stateH245_MS_NONE20:58:23:changing from H245_MS_NONE state to H245_MS_WAIT state20:58:23:Changing to new event H245_EVENT_CAP20:58:23:H245 CAP FSM:received event H245_EVENT_CAP while at stateH245_CAP_NONE20:58:23:changing from H245_CAP_NONE state to H245_CAP_WAIT state20:58:23:cch323_h245_receiver:received msg of typeM_H245_MS_DETERMINE_INDICATION20:58:23:Changing to new event H245_EVENT_MS_IND20:58:23:H245 MS FSM:received event H245_EVENT_MS_IND while at stateH245_MS_WAIT20:58:23:cch323_h245_receiver:received msg of typeM_H245_CAP_TRANSFER_INDICATION20:58:23:Changing to new event H245_EVENT_CAP_IND20:58:23:H245 CAP FSM:received event H245_EVENT_CAP_IND while at stateH245_CAP_WAIT20:58:23:cch323_h245_receiver:received msg of typeM_H245_MS_DETERMINE_CONFIRM20:58:23:Changing to new event H245_EVENT_MS_CFM20:58:23:H245 MS FSM:received event H245_EVENT_MS_CFM while at stateH245_MS_WAIT20:58:23:changing from H245_MS_WAIT state to H245_MS_DONE state0:58:23:cch323_h245_receiver:received msg of type M_H245_CAP_TRANSFER_CONFIRM20:58:23:Changing to new event H245_EVENT_CAP_CFM20:58:23:H245 CAP FSM:received event H245_EVENT_CAP_CFM while at stateH245_CAP_WAIT20:58:23:changing from H245_CAP_WAIT state to H245_CAP_DONE state20:58:23:Changing to new event H245_EVENT_OLC20:58:23:H245 OLC FSM:received event H245_EVENT_OLC while at stateH245_OLC_NONE20:58:23:changing from H245_OLC_NONE state to H245_OLC_WAIT state20:58:23:cch323_h245_receiver:received msg of typeM_H245_UCHAN_ESTABLISH_INDICATION20:58:23:Changing to new event H245_EVENT_OLC_IND20:58:23:H245 OLC FSM:received event H245_EVENT_OLC_IND while at stateH245_OLC_WAIT20:58:23:cch323_h245_receiver:received msg of type M_H245_UCHAN_ESTAB_ACK20:58:23:Changing to new event H245_EVENT_OLC_CFM20:58:23:H245 OLC FSM:received event H245_EVENT_OLC_CFM while at state
Cisco IOS Debug Command Reference - Commands A through D246
debug backhaul-session-manager session through debug channel packetsdebug cch323
H245_OLC_WAIT20:58:23:changing from H245_OLC_WAIT state to H245_OLC_DONE stateThe table below describes the significant fields shown in the display.
Table 45: debug cch323 h245 Field Descriptions
DescriptionField
Send MSD event message to the state machine.H245_EVENT_MSD
An H225 master slave determination finite statemachine.
H245 MS FSM
The initial state of the MSD state machine.H245_MS_NONE
In this state, a MSD message is sent, and the deviceis waiting for the reply.
H245_MS_WAIT
Send CAP event message.H245_EVENT_CAP
This is the H245 terminal CAP finite state machine.H245 CAP FSM
The initial state of the CAP state machine.H245_CAP_NONE
In this state, a CAP message is sent, and the deviceis waiting for the reply.
H245_CAP_WAIT
TheMSDmessage that has been received by an H245terminal from a remote H323 endpoint.
M_H245_MS_DETERMINE _INDICATION
Received MSD event message.H245_EVENT_MS_IND
A CAP message that has been received by the H245terminal from an H323 remote endpoint.
M_H245_CAP_TRANSFER_INDICATION
Received CAP event message.H245_EVENT_CAP_IND
A confirmation message that the H245 master slavetermination message was sent.
M_H245_MS_DETERMINE_CONFIRM
Send MSD acknowledge event message.H245_EVENT_MS_CFM
The result is in.H245_MS_DONE
An indication to the H245 terminal that the CAPmessage was sent.
M_H245_CAP_TRANSFER_CONFIRM
Send CAP acknowledge event message.H245_EVENT_CAP_CFM
The result is in.H245_CAP_DONE
Send OLC event message.H245_EVENT_OLC
Cisco IOS Debug Command Reference - Commands A through D 247
debug backhaul-session-manager session through debug channel packetsdebug cch323
DescriptionField
The initial state of the OLC state machine.H245_OLC_NONE
In this state, an OLC message is sent, and the deviceis waiting for the reply.
H245_OLC_WAIT
TheOLCmessage received by anH245 terminal froma remote H323 endpoint.
M_H245_UCHAN_ESTABLISH_INDICATION
Received OLC event message.H245_EVENT_OLC_IND
The OLC message acknowledgment received by anH245 terminal from a remote H323 endpoint.
M_H245_UCHAN_ESTAB_ACK
Send OLC acknowledge event message.H245_EVENT_OLC_CFM
The OLC finite state machine of the H245 terminal.H245 OLC FSM
Send OLC acknowledge event message.H245_EVENT_OLC_CFM
The result is in.H245_OLC_DONE
Examples The following is sample output from a debugcch323nxe request:
Router# debug cch323 nxe00:15:54:nxe_handle_usrmsg_to_remote:User Message size is 22700:15:54:nxe_msg_send_possible:Msg put in the active Q for CRV [3, direction flag 0]00:15:54:nxe_send_msg:H323chan returns bytes sent=241, the actual len=241, to IPaddr[0xA4D4A02], Port [2517]00:15:54:nxe_handle_usrmsg_to_remote:Usr Msg sent for IPaddr [0xA4D4A02], Port [2517], CRV
[3, direction flag 0]00:15:54:nxe_parse_msg_from_remote:Msg received from IP [0xA4D4A02], Port [2517]00:15:54:nxe_parse_msg_from_remote:Value of PDU flags = 0x200:15:54:nxe_parse_payload:Transport msg type, Payload flag = 0x000:15:54:nxe_receive_ack:Ack received for 1 pdus00:15:54:nxe_receive_ack:Ack received for seqnum=13 from IPAddr [0xA4D4A02], Port [2517]00:15:54:nxe_parse_msg_from_remote:Msg received from IP [0xA4D4A02], Port [2517]00:15:54:nxe_parse_msg_from_remote:Value of PDU flags = 0x300:15:54:nxe_parse_payload:Static msg type, Payload flag = 0xA000:15:54:nxe_parse_x_static:Rx H225 msg from IPaddr [0xA4D4A02], Port [2517], CRV [3,direction flag 0]00:15:54:nxe_make_ackmsg:NXE ACK Msg made to ack seqnum=1400:15:54:nxe_send_msg:H323chan returns bytes sent=16, the actual len=16, to IPaddr[0xA4D4A02], Port [2517]00:15:54:nxe_parse_msg_from_remote:Ack sent for Destination IPaddr [0xA4D4A02], Port[2517]00:15:54:nxe_parse_msg_from_remote:Msg received from IP [0xA4D4A02], Port [2517]00:15:54:nxe_parse_msg_from_remote:Value of PDU flags = 0x300:15:54:nxe_parse_payload:Static msg type, Payload flag = 0xA000:15:54:nxe_parse_x_static:Rx H225 msg from IPaddr [0xA4D4A02], Port [2517], CRV [3,direction flag 0]
Cisco IOS Debug Command Reference - Commands A through D248
debug backhaul-session-manager session through debug channel packetsdebug cch323
Examples The following is sample output from a typical debugcch323ras request on a Cisco 3640 router:
Router# debug cch323 ras20:58:49:Changing to new event CCH323_RAS_EVENT_SEND_RRQcch323_run_ras_sm:received event CCH323_RAS_EVENT_SEND_RRQ while at CCH323_RAS_STATE_IDLEstatecch323_run_ras_sm:changing to CCH323_RAS_STATE_RRQ statecch323_ras_receiver:received msg of type RCF_CHOSENcch323_run_ras_sm:received event CCH323_RAS_EVENT_RCF while at CCH323_RAS_STATE_RRQ statecch323_run_ras_sm:changing to CCH323_RAS_STATE_IDLE state20:58:59:cch323_percall_ras_sm:received event CCH323_RAS_EVENT_NEWCALL while atCCH323_RAS_STATE_IDLE state20:58:59:cch323_percall_ras_sm:changing to new state CCH323_RAS_STATE_ARQcch323_ras_receiver:received msg of type ACF_CHOSEN20:58:59:cch323_percall_ras_sm:received event CCH323_RAS_EVENT_ACF while atCCH323_RAS_STATE_ARQ state20:58:59:cch323_percall_ras_sm:changing to new stateCCH323_RAS_STATE_ACTIVE20:59:02:cch323_percall_ras_sm:received event CCH323_RAS_EVENT_CALLDISC whileat CCH323_RAS_STATE_ACTIVE state20:59:02:cch323_percall_ras_sm:changing to new state CCH323_RAS_STATE_DRQcch323_ras_receiver:received msg of type DCF_CHOSEN20:59:02:cch323_percall_ras_sm:received event CCH323_RAS_EVENT_DCF while atCCH323_RAS_STATE_DRQ state20:59:02:cch323_percall_ras_sm:changing to new state CCH323_RAS_STATE_IDLE20:59:04:cch323_percall_ras_sm:received event CCH323_RAS_EVENT_IRR while atCCH323_RAS_STATE_ACTIVE state20:59:04:cch323_percall_ras_sm:changing to new stateCCH323_RAS_STATE_ACTIVEThe table below describes the significant fields shown in the display.
Table 46: debug cch323 ras Field Descriptions
DescriptionField
Send RRQ event message.CCH323_RAS_EVENT_SEND_RRQ
The global state machine is in the idle state.CCH323_RAS_STATE_IDLE
The state machine is in the RRQ state. In this state,the gateway is registering with a gatekeeper.
CCH323_RAS_STATE_RRQ
A registration confirmmessage that has been receivedfrom a gatekeeper.
RCF_CHOSEN
Received RCF event message.CCH323_RAS_EVENT_RCF
New call event.CCH323_RAS_EVENT_NEWCALL
The per-call state machine is in the process ofadmitting a new call.
CCH323_RAS_STATE_ARQ
ACF message that has been received from agatekeeper.
ACF_CHOSEN
Received ACF event message.CCH323_RAS_EVENT_ACF
Cisco IOS Debug Command Reference - Commands A through D 249
debug backhaul-session-manager session through debug channel packetsdebug cch323
DescriptionField
The per-call state machine is in the call active state.CCH323_RAS_STATE_ACTIVE
Call disconnect event message.CCH323_RAS_EVENT_CALLDISC
The per-call state machine is in the process ofdisengaging an active call.
CCH323_RAS_STATE_DRQ
The disengage confirm message that has beenreceived from a gatekeeper.
DCF_CHOSEN
Received DCF event message.CCH323_RAS_EVENT_DCF
Send IRR event message.CCH323_RAS_EVENT_IRR
Examples The following is sample output from a typical debugcch323rawmsg request on a Cisco 3640 router:
Router# debug cch323 rawmsg00:32:04:cch323_h225_progress_ind:raw message is 4 bytes:1E 02 81 8800:32:22:cch323_h225_release_ind:raw message is 80 bytes:00 00 00 00 00 00 00 00 00 00 0000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0000 00 00 00 00 00 00 00 0000:32:22:cch323_h225_release_notify:raw message is 80 bytes:00 00 00 00 00 00 00 00 00 0000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0000 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0000 00 00 00 00 00 00 00 00 00
Examples Following are two examples of output using the debugcch323session command and keyword combination.The first example is for a call setup on an originating gateway. The second example is for a call setup on aterminating gateway.
The following is sample output from a typical debugcch323session request for a call setup on an originatinggateway:
Router# debug cch323 session00:33:49:cch323_call_setup:gw_id=1, callID=1600:33:49:cch323_get_new_ccb:ccb (0x81D12D2C) is in use00:33:49:cch323_call_setup:inserted ccbcch323_get_peer_info:faxrate[21]proto[2]bitmask[10002]t38_inhibit[0]global_fax[0]00:33:49:Not using Voice Class Codec00:33:49:cch323_get_peer_info:preffered_codec set to G729IETF with Bytes = 2000:33:49:cch323_get_peer_info:peer:81FC0D14, peer->voice_peer_tag:12D, ccb:81D12D2C00:33:49:Call_setup Playout Mode:0,Init 60, Min 40, Max 20000:33:49:No account/pin number available00:33:49:cch323_call_setup_normal:for callID 1000:33:49:timer (0x81D130D4)starts - delay (15000)00:33:49:cch323_ct_main:SOCK 1 Event 0x100:33:49:timer(0x81D130D4) stops00:33:49:Near-end Pref Codecs = G.729 IETF00:33:49: generic_open_logical_channel:codec is g72900:33:49:cch323_generic_open_logical_channel:Filling in qosCapability field to 000:33:49:timer (0x81D130D4)starts - delay (15000)00:33:49:cch323_ct_main:SOCK 1 Event 0x100:33:49:cch323_ct_main:SOCK 1 Event 0x100:33:49: [1]towner_data=0x81D13C88, len=105, msgPtr=0x81D07608
Cisco IOS Debug Command Reference - Commands A through D250
debug backhaul-session-manager session through debug channel packetsdebug cch323
00:33:49:cch323_gw_process_read_socket:received msg for H.22500:33:49:timer(0x81D130D4) stops00:33:49:timer (0x81D130D4)starts - delay (180000)00:33:49:Codec:loc(16), rem(16),Bytes:loc(20), Fwd(20), Rev(20)00:33:49:cch323_rtp_open_notify:00:33:50:cch323_ct_main:SOCK 1 Event 0x100:33:50: [1]towner_data=0x81D13C88, len=71, msgPtr=0x81F1F2E000:33:50:cch323_gw_process_read_socket:received msg for H.22500:33:50:cch323_caps_ind:cap_modem_proto:0, cap_modem_codec:0, cap_modem_redundancy:0 payload10000:33:50:cch323_caps_ind:Load DSP with Negotiated codec(16) g729r8, Bytes=2000:33:50:cch323_caps_ind:set DSP for dtmf-relay = CC_CAP_DTMF_RELAY_INBAND_VOICEThe following is sample output from a typical debugcch323session request for a call setup on a terminatinggateway:
Router# debug cch323 session00:23:27:cch323_ct_main:SOCK 0 Event 0x100:23:27:cch323_ct_main:SOCK 1 Event 0x100:23:27: [1]towner_data=0x81F9CA9C, len=179, msgPtr=0x81D15C6C00:23:27:cch323_gw_process_read_socket:received msg for H.22500:23:27:cch323_h225_receiver CCB not existing already00:23:27:cch323_get_new_ccb:ccb (0x81F90184) is in use00:23:27:cch323_h225_receiver Got a new CCB for call id -211546756400:23:27:cch323_h225_setup_ind00:23:27:Not using Voice Class Codec00:23:27:cch323_set_peer:peer:81FB3228, peer->voice_peer_tag:12C, ccb:81F9018400:23:27:Near-end Pref Codecs = G.729 IETF00:23:27:Codec:loc(16), rem(16),Bytes:loc(20), Fwd(20), Rev(20)00:23:27:cch323_build_fastStart_cap_response:Retrieved qosCapability of 000:23:27:cch323_build_fastStart_cap_response:In Response Filling in qosCapability fieldto 000:23:27:Not using Voice Class Codec
Related Commands DescriptionCommand
Clears the H.323 gateway counters.clear h323 gateway
Displays all pertinent AnnexG messages that havebeen transmitted and received.
debug h323-annexg
Displays the rawmessage owner, length, and pointer.debug voip rawmsg
Displays statistics for H.323 gateway messages thathave been sent and received and displays the reasonsfor which H.323 calls have been disconnected.
show h323 gateway
Cisco IOS Debug Command Reference - Commands A through D 251
debug backhaul-session-manager session through debug channel packetsdebug cch323
debug cch323 capacityTo track the call capacity of the gatekeeper, use the debugcch323capacity command in privileged EXECmode. To disable debugging output, use the no form of this command.
debug cch323 capacity
no debug cch323 capacity
Syntax Description This command has no keywords or arguments.
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(11)T
Usage Guidelines Use the debugcch323capacity command to track the maximum and current call capacity values in theRegistration, Admission, and Status (RAS) Protocol messages and to debug capacity-related problems whilesending RASmessages. This command is entered on the gateway to monitor the call capacity of the gatekeeper.
The command lists the values for current and maximum call capacity provided by the trunk group capacityresource manager if and when the H.323 Service Provider Interface (SPI) requests the information for all orspecific groups of circuits.
Examples The following is sample output from the debugcch323capacity command:
Router# debug cch323 capacityCall Capacity Information tracing is enabled5d00h: cch323_process_carrier_update: Registered = 1,Event = 1,Reason = 15d00h: cch323_process_carrier_update: CarrierId = CARRIERA_NEWENGLAND5d00h: cch323_fill_crm_CallCapacities: Reason = 1, GroupID = CARRIERA_NEWENGLAND5d00h: Capacity Details: Maximum Channels in Group: 23
Max. Voice Calls(In) : 23, Max. Voice Calls(Out): 23Active Voice Calls(In): 5, Active Voice Calls(Out): 7Max. Voice Calls(to GK): 23, Avail. Voice Calls(to GK): 11
The gatekeeper displays this output when trunk groups are added, deleted, or modified or when circuits in atrunk group are deactivated or activated (similar to ISDN layer 2 down/up).
5d00h: cch323_process_carrier_update: Registered = 1,Event = 1,Reason = 15d00h: cch323_process_carrier_update: CarrierId = CARRIERA_NEWENGLAND
The table below describes the significant fields shown in the display.
Cisco IOS Debug Command Reference - Commands A through D252
debug backhaul-session-manager session through debug channel packetsdebug cch323 capacity
Table 47: debug cch323 capacity Update Field Descriptions
DescriptionField
Gateway registration:
• 0=Gateway is not registered to the gatekeeper
• 1=Gateway is registered to the gatekeeper at thetime of the change
Registered
Carriers updated:
• 0=All carriers updated
• 1=Single carrier updated
Event
Reason for the update notification:
• 0=CURRENT_CAPACITY_UPDATE
• 1=MAX_CAPACITY_UPDATE
• 2=BOTH_CAPACITY_UPDATE
Reason
ID of the trunk group or carrier to which the changeapplies.
CarrierID
The gatekeeper displays this output whenever call capacity information is sent to the gatekeeper.
5d00h: cch323_fill_crm_CallCapacities: Reason = 1, GroupID = CARRIERA_NEWENGLAND5d00h: Capacity Details: Maximum Channels in Group: 23
Max. Voice Calls(In) : 23, Max. Voice Calls(Out): 23Active Voice Calls(In): 5, Active Voice Calls(Out): 7Max. Voice Calls(to GK): 23, Avail. Voice Calls(to GK): 11
The table below describes the significant fields shown in the display.
Table 48: debug cch323 capacity Call Capacity Field Descriptions
DescriptionField
The circuit’s carrier identification (ID) or trunk grouplabel.
GroupID
Maximumnumber of physical (or configured) circuits.Maximum Channels in Group
Maximum number of allowed incoming voice anddata calls.
Max. Voice Calls(In)
Maximum number of allowed outgoing voice anddata calls.
Max. Voice Calls(Out)
Cisco IOS Debug Command Reference - Commands A through D 253
debug backhaul-session-manager session through debug channel packetsdebug cch323 capacity
DescriptionField
Current number of active incoming voice and datacalls.
Active Voice Calls(In)
Current number of active outgoing voice and datacalls.
Active Voice Calls(Out)
Maximum call capacity value to be sent to thegatekeeper in the RAS message.
Max. Voice Calls(to GK)
Available call capacity value to be sent to thegatekeeper in the RAS message.
Avail. Voice Calls(to GK)
Related Commands DescriptionCommand
Associates a carrier with a non-Cisco endpoint.endpoint circuit-id h323id
Cisco IOS Debug Command Reference - Commands A through D254
debug backhaul-session-manager session through debug channel packetsdebug cch323 capacity
debug cch323 h225To provide the trace of the state transition of the H.225 state machine based on the processed events, use thedebug cch323 h225 command in privileged EXEC mode. To disable debugging output, use the no form ofthis command.
debug cch323 h225
no debug cch323 h225
Syntax Description This command has no keywords or arguments.
Command Default Disabled
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.11.3(6)NA2
This command was implemented on the Cisco AS5850.12.2(2)XB1
This command was integrated into Cisco IOS Release 12.2(11)T.12.2(11)T
Usage Guidelines State Descriptions
The state definitions of the different states of the H.225 state machine are as follows:
• H225_IDLE--This is the initial state of the H.225 state machine. The H.225 state machine is in this statebefore issuing a call setup request (for the outbound IP call case) or ready to receive an incoming IPcall.
• H225_SETUP--This is the call setup state. The state machine transitions to this state after sending outa call setup request, or after the reception of an incoming call indication.
• H225_ALERT--This is the call alerting state. The state machine transitions to this state after sendingthe alerting message or after the reception of an alerting message from the peer.
• H225_CALLPROC--This is the call proceeding state.
• H225_ACTIVE--This is the Call connected state. In this state, the call is active. The state machinetransitions to this state after sending the connect message to the peer or after the reception of the connectmessage from the peer.
• H225_WAIT_FOR_ARQ--This is the state where the H.225 state machine is waiting for the completionof the ARQ process from the Registration, Admission, and Status Protocol (RAS) state machine.
Cisco IOS Debug Command Reference - Commands A through D 255
debug backhaul-session-manager session through debug channel packetsdebug cch323 h225
• H225_WAIT_FOR_DRQ--This is the state where the H.225 state machine is waiting for the completionof the DRQ process from the RAS state machine.
• H225_WAIT_FOR_H245--This is the state where the H.225 state machine is waiting for the success orfailure from the H.245 state machine.
Events Description
The event definitions of the different events of the H.225 state machine are as follows:
• H225_EVENT_NONE-- No event.
• H225_EVENT_ALERT--This event indicates the H.225 state machine to send an alerting message tothe peer.
• H225_EVENT_ALERT_IND--This event indicates the H.225 state machine that an alerting messageis received from the peer.
• H225_EVENT_CALLPROC--This event indicates the H.225 state machine to send a call proceedingmessage to the peer.
• H225_EVENT_CALLPROC_IND--This event indicates the H.225 state machine that a call proceedingmessage is received from the peer.
• H225_EVENT_REJECT--This event indicates the H.225 state machine to reject the call setup requestfrom the peer.
• H225_EVENT_REJECT_IND--This event indicates the H.225 state machine that a call setup requestto the peer is rejected.
• H225_EVENT_RELEASE--This event indicates the H.225 state machine to send a release completemessage to the peer.
• H225_EVENT_RELEASE_IND--This event indicates the H.225 state machine that a release completemessage is received from the peer.
• H225_EVENT_SETUP--This event indicates the H.225 state machine to send a setup message to thepeer.
• H225_EVENT_SETUP_IND--This event indicates the H.225 state machine that a setup message isreceived from the peer.
• H225_EVENT_SETUP_CFM--This event indicates the H.225 state machine to send a connect messageto the peer.
• H225_EVENT_SETUP_CFM_IND--This event indicates the H.225 statemachine that a connect messagefrom the peer.
• H225_EVENT_RAS_SUCCESS--This event indicates the H.225 state machine that the pending RASoperation is successful.
• H225_EVENT_RAS_FAILED--This event indicates the H.225 state machine that the pending RASoperation failed.
• H225_EVENT_H245_SUCCESS--This event indicates the H.225 state machine that the pending H.245operation is successful.
• H225_EVENT_H245_FAILED--This event indicates the H.225 state machine that the pending H.245operation failed.
Cisco IOS Debug Command Reference - Commands A through D256
debug backhaul-session-manager session through debug channel packetsdebug cch323 h225
Examples The following is sample output from the debugcch323h225 command:
Router# debug cch323 h22520:59:17:Set new event H225_EVENT_SETUP20:59:17:H225 FSM:received event H225_EVENT_SETUP while at state H225_IDLE20:59:17:Changing from H225_IDLE state to H225_SETUP state20:59:17:cch323_h225_receiver:received msg of type SETUPCFM_CHOSEN20:59:17:H225 FSM:received event H225_EVENT_SETUP_CFM_IND while at stateH225_SETUP20:59:17:Changing from H225_SETUP state to H225_ACTIVE state20:59:17:Set new event H225_EVENT_H245_SUCCESS20:59:17:H225 FSM:received event H225_EVENT_H245_SUCCESS while at stateH225_ACTIVE20:59:20:Set new event H225_EVENT_RELEASE20:59:20:H225 FSM:received event H225_EVENT_RELEASE while at stateH225_ACTIVE20:59:20:Changing from H225_ACTIVE state to H225_WAIT_FOR_DRQ state20:59:20:Set new event H225_EVENT_RAS_SUCCESS20:59:20:H225 FSM:received event H225_EVENT_RAS_SUCCESS while at stateH225_WAIT_FOR_DRQ20:59:20:Changing from H225_WAIT_FOR_DRQ state to H225_IDLE state
Cisco IOS Debug Command Reference - Commands A through D 257
debug backhaul-session-manager session through debug channel packetsdebug cch323 h225
debug cch323 h245To provide the trace of the state transition of the H.245 state machine based on the processed events, use thedebug cch323 h245 command in privileged EXEC mode. To disable debugging output, use the no form ofthis command.
debug cch323 h245
no debug cch323 h245
Syntax Description This command has no arguments or keywords.
Command Default Disabled
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.11.3(6)NA2
This command was implemented on the Cisco AS5850.12.2(2)XB1
This command was integrated into Cisco IOS Release 12.2(11)T.12.2(11)T
Usage Guidelines The H.245 state machines include the following three state machines:
• Master SlaveDetermination (MSD) state machine
• Capability Exchange (CAP) state machine
• Open Logical Channel (OLC) state machine
State Definitions
The definitions are as follows:
• H245_MS_NONE-- This is the initial state of the master slave determination state machine.
• H245_MS_WAIT--In this state, a Master Slave Determination message is sent, waiting for the reply.
• H245_MS_DONE-- The result is in.
• H245_CAP_NONE--This is the initial state of the capabilities exchange state machine.
• H245_CAP_WAIT--In this state, a cap exchange message is sent, waiting for reply.
• H245_CAP_DONE--The result is in.
• H245_OLC_NONE--This is the initial state of the open logical channel state machine.
Cisco IOS Debug Command Reference - Commands A through D258
debug backhaul-session-manager session through debug channel packetsdebug cch323 h245
• H245_OLC_WAIT: OLC message sent, waiting for reply.
• H245_OLC_DONE: OLC done.
Event definitions
• H245_EVENT_MSD--Send MSD message
• H245_EVENT_MS_CFM--Send MSD acknowledge message
• H245_EVENT_MS_REJ--Send MSD reject message
• H245_EVENT_MS_IND-- Received MSD message
• H245_EVENT_CAP--Send CAP message
• H245_EVENT_CAP_CFM--Send CAP acknowledge message
• H245_EVENT_CAP_REJ--Send CAP reject
• H245_EVENT_CAP_IND--Received CAP message
• H245_EVENT_OLC--Send OLC message
• H245_EVENT_OLC_CFM--Send OLC acknowledge message
• H245_EVENT_OLC_REJ--Send OLC reject message
• H245_EVENT_OLC_IND--Received OLC message
Examples The following is sample output from the debugcch323h245 command:
Router# debug cch323 h24520:58:23:Changing to new event H245_EVENT_MSD20:58:23:H245 MS FSM:received event H245_EVENT_MSD while at stateH245_MS_NONE20:58:23:changing from H245_MS_NONE state to H245_MS_WAIT state20:58:23:Changing to new event H245_EVENT_CAP20:58:23:H245 CAP FSM:received event H245_EVENT_CAP while at stateH245_CAP_NONE20:58:23:changing from H245_CAP_NONE state to H245_CAP_WAIT state20:58:23:cch323_h245_receiver:received msg of typeM_H245_MS_DETERMINE_INDICATION20:58:23:Changing to new event H245_EVENT_MS_IND20:58:23:H245 MS FSM:received event H245_EVENT_MS_IND while at stateH245_MS_WAIT20:58:23:cch323_h245_receiver:received msg of typeM_H245_CAP_TRANSFER_INDICATION20:58:23:Changing to new event H245_EVENT_CAP_IND20:58:23:H245 CAP FSM:received event H245_EVENT_CAP_IND while at stateH245_CAP_WAIT20:58:23:cch323_h245_receiver:received msg of typeM_H245_MS_DETERMINE_CONFIRM20:58:23:Changing to new event H245_EVENT_MS_CFM20:58:23:H245 MS FSM:received event H245_EVENT_MS_CFM while at stateH245_MS_WAIT20:58:23:changing from H245_MS_WAIT state to H245_MS_DONE state0:58:23:cch323_h245_receiver:received msg of type M_H245_CAP_TRANSFER_CONFIRM20:58:23:Changing to new event H245_EVENT_CAP_CFM20:58:23:H245 CAP FSM:received event H245_EVENT_CAP_CFM while at stateH245_CAP_WAIT20:58:23:changing from H245_CAP_WAIT state to H245_CAP_DONE state20:58:23:Changing to new event H245_EVENT_OLC20:58:23:H245 OLC FSM:received event H245_EVENT_OLC while at stateH245_OLC_NONE20:58:23:changing from H245_OLC_NONE state to H245_OLC_WAIT state
Cisco IOS Debug Command Reference - Commands A through D 259
debug backhaul-session-manager session through debug channel packetsdebug cch323 h245
20:58:23:cch323_h245_receiver:received msg of typeM_H245_UCHAN_ESTABLISH_INDICATION20:58:23:Changing to new event H245_EVENT_OLC_IND20:58:23:H245 OLC FSM:received event H245_EVENT_OLC_IND while at stateH245_OLC_WAIT20:58:23:cch323_h245_receiver:received msg of type M_H245_UCHAN_ESTAB_ACK20:58:23:Changing to new event H245_EVENT_OLC_CFM20:58:23:H245 OLC FSM:received event H245_EVENT_OLC_CFM while at stateH245_OLC_WAIT20:58:23:changing from H245_OLC_WAIT state to H245_OLC_DONE state
Cisco IOS Debug Command Reference - Commands A through D260
debug backhaul-session-manager session through debug channel packetsdebug cch323 h245
debug cch323 preauthTo enable diagnostic reporting of authentication, authorization, and accounting (AAA) call preauthenticationfor H.323 calls, use the debugcch323preauth command in privileged EXEC mode. To disable debuggingoutput, use the no form of this command.
debug cch323 preauth
no debug cch323 preauth
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(11)T
Examples The following is debugging output for a single H.323 call:
Router# debug cch323 preauthCCH323 preauth tracing is enabledcch323_is_preauth_reqd is TRUEJan 23 18:39:56.393: In cch323_send_preauth_req for preauth_id = -1Jan 23 18:39:56.393: Entering rpms_proc_print_preauth_reqJan 23 18:39:56.393: Request = 0Jan 23 18:39:56.393: Preauth id = 86514Jan 23 18:39:56.393: EndPt Type = 1Jan 23 18:39:56.393: EndPt = 192.168.81.102Jan 23 18:39:56.393: Resource Service = 1Jan 23 18:39:56.393: Call_origin = answerJan 23 18:39:56.393: Call_type = voipJan 23 18:39:56.393: Calling_num = 2230001Jan 23 18:39:56.393: Called_num = 1#1130001Jan 23 18:39:56.393: Protocol = 0Jan 23 18:39:56.393: cch323_insert_preauth_tree:Created node with preauth_id = 86514 ,ccb6852D5BC , node 651F87FCJan 23 18:39:56.393:rpms_proc_create_node:Created node with preauth_id = 86514Jan 23 18:39:56.393:rpms_proc_send_aaa_req:uid got is 466725Jan 23 18:39:56.397:rpms_proc_preauth_response:Context is for preauth_id 86514, aaa_uid466725Jan 23 18:39:56.397: Entering Function cch323_rpms_proc_callback_funcJan 23 18:39:56.397:cch323_rpms_proc_callback_func:PREAUTH_SUCCESS for preauth id 86514aaa_uid 466725 auth_serv 1688218168Jan 23 18:39:56.397:rpms_proc_preauth_response:Deleting Tree node for preauth id 86514 uid466725Jan 23 18:39:56.397:cch323_get_ccb_and_delete_from_preauth_tree:Preauth_id=86514cch323_get_ccb_and_delete_from_preauth_tree:651F87FC node and 6852D5BC ccbThe table below describes the significant fields shown in the display.
Cisco IOS Debug Command Reference - Commands A through D 261
debug backhaul-session-manager session through debug channel packetsdebug cch323 preauth
Table 49: debug cch323 preauth Field Descriptions
DescriptionField
Request Type--0 for preauthentication, 1 fordisconnect.
Request
Identifier for the preauthentication request.Preauth id
Call Origin End Point Type--1 for IP address, 2 forIZCT value.
EndPt Type
Call Origin End Point Value--An IP address or IZCTvalue.
EndPt
Resource Service Type--1 for Reservation, 2 forQuery.
Resource Service
Answer.Call_origin
Voice over IP (VoIP).Call_type
Calling Party Number (CLID).Calling_num
Called Party Number (DNIS).Called_num
0 for H.323, 1 for SIP.Protocol
Various identifiers and status reports for executedfunctions.
function reports
Cisco IOS Debug Command Reference - Commands A through D262
debug backhaul-session-manager session through debug channel packetsdebug cch323 preauth
debug cch323 rasTo provide the trace of the state transition of the Registration, Admission, and Status (RAS) Protocol statemachine based on the processed events, use the debugcch323ras command in privileged EXEC mode. Todisable debugging output, use the no form of this command.
debug cch323 ras
no debug cch323 ras
Syntax Description This command has no keywords or arguments.
Command Default Disabled
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.11.3(6)NA2
This command was implemented on the Cisco AS5850.12.2(2)XB1
This command was integrated into Cisco IOS Release 12.2(11)T.12.2(11)T
Usage Guidelines RAS operates in two state machines. One global state machine controls the overall RAS operation of theGateway. The other state machine is a per call state machine that controls the active calls.
State definitions
The state definitions of the different states of the RAS state machine follow:
• CCH323_RAS_STATE_NONE--This is the initial state of the RAS state machine.
• CCH323_RAS_STATE_GRQ--The state machine is in the Gatekeeper Request (GRQ) state. In thisstate, the gateway is in the process of discovering a gatekeeper.
• CCH323_RAS_STATE_RRQ--The state machine is in the Registration Request (RRQ) state. In thisstate, the gateway is in the process of registering with a gatekeeper.
• CCH323_RAS_STATE_IDLE--The global state machine is in the idle state.
• CCH323_RAS_STATE_URQ--The state machine is in the Unregistration Request (URQ) state. In thisstate, the gateway is in the process of unregistering with a gatekeeper.
• CCH323_RAS_STATE_ARQ--The per call state machine is in the process of admitting a new call.
• CCH323_RAS_STATE_ACTIVE--The per call state machine is in the call active state.
Cisco IOS Debug Command Reference - Commands A through D 263
debug backhaul-session-manager session through debug channel packetsdebug cch323 ras
• CCH323_RAS_STATE_DRQ--The per call state machine is in the process of disengaging an activecall.
Event Definitions
These are the event definitions of the different states of the RAS state machine:
• CCH323_RAS_EVENT_NONE--Nothing.
• CCH323_RAS_EVENT_GWUP--Gateway is coming up.
• CCH323_RAS_EVENT_GWDWN--Gateway is going down.
• CCH323_RAS_EVENT_NEWCALL--New call.
• CCH323_RAS_EVENT_CALLDISC--Call disconnect.
• CCH323_RAS_EVENT_GCF--Received Gatekeeper Confirmation (GCF).
• CCH323_RAS_EVENT_GRJ--Received Gatekeeper Rejection (GRJ).
• CCH323_RAS_EVENT_ACF--Received Admission Confirmation (ACF).
• CCH323_RAS_EVENT_ARJ--Received Admission Rejection (ARJ).
• CCH323_RAS_EVENT_SEND_RRQ--Send Registration Request (RRQ).
• CCH323_RAS_EVENT_RCF--Received Registration Confirmation (RCF).
• CCH323_RAS_EVENT_RRJ--Received Registration Rejection (RRJ).
• CCH323_RAS_EVENT_SEND_URQ--Send URQ.
• CCH323_RAS_EVENT_URQ--Received URQ.
• CCH323_RAS_EVENT_UCF--Received Unregister Confirmation (UCF).
• CCH323_RAS_EVENT_SEND_UCF--Send Unregister Confirmation (UCF).
• CCH323_RAS_EVENT_URJ--Received Unregister Reject (URJ).
• CCH323_RAS_EVENT_BCF--Received Bandwidth Confirm (BCF).
• CCH323_RAS_EVENT_BRJ--Received Bandwidth Rejection (BRJ).
• CCH323_RAS_EVENT_DRQ--Received Disengage Request (DRQ).
• CCH323_RAS_EVENT_DCF--Received Disengage Confirm (DCF).
• CCH323_RAS_EVENT_SEND_DCF--Send Disengage Confirm (DCF).
• CCH323_RAS_EVENT_DRJ--Received Disengage Reject (DRJ).
• CCH323_RAS_EVENT_IRQ--Received Interrupt Request (IRQ).
• CCH323_RAS_EVENT_IRR--Send Information Request (IRR).
• CCH323_RAS_EVENT_TIMEOUT--Message timeout.
Examples The following is sample output from the debugcch323preauth command:
Router# debug cch323 preauth20:58:49:Changing to new event CCH323_RAS_EVENT_SEND_RRQ
Cisco IOS Debug Command Reference - Commands A through D264
debug backhaul-session-manager session through debug channel packetsdebug cch323 ras
cch323_run_ras_sm:received event CCH323_RAS_EVENT_SEND_RRQ while at CCH323_RAS_STATE_IDLEstatecch323_run_ras_sm:changing to CCH323_RAS_STATE_RRQ statecch323_ras_receiver:received msg of type RCF_CHOSENcch323_run_ras_sm:received event CCH323_RAS_EVENT_RCF while at CCH323_RAS_STATE_RRQ statecch323_run_ras_sm:changing to CCH323_RAS_STATE_IDLE state20:58:59:cch323_percall_ras_sm:received event CCH323_RAS_EVENT_NEWCALL while atCCH323_RAS_STATE_IDLE state20:58:59:cch323_percall_ras_sm:changing to new state CCH323_RAS_STATE_ARQcch323_ras_receiver:received msg of type ACF_CHOSEN20:58:59:cch323_percall_ras_sm:received event CCH323_RAS_EVENT_ACF while atCCH323_RAS_STATE_ARQ state20:58:59:cch323_percall_ras_sm:changing to new stateCCH323_RAS_STATE_ACTIVE20:59:02:cch323_percall_ras_sm:received event CCH323_RAS_EVENT_CALLDISC whileat CCH323_RAS_STATE_ACTIVE state20:59:02:cch323_percall_ras_sm:changing to new state CCH323_RAS_STATE_DRQcch323_ras_receiver:received msg of type DCF_CHOSEN20:59:02:cch323_percall_ras_sm:received event CCH323_RAS_EVENT_DCF while atCCH323_RAS_STATE_DRQ state20:59:02:cch323_percall_ras_sm:changing to new state CCH323_RAS_STATE_IDLE20:59:04:cch323_percall_ras_sm:received event CCH323_RAS_EVENT_IRR while atCCH323_RAS_STATE_ACTIVE state20:59:04:cch323_percall_ras_sm:changing to new stateCCH323_RAS_STATE_ACTIVE
Cisco IOS Debug Command Reference - Commands A through D 265
debug backhaul-session-manager session through debug channel packetsdebug cch323 ras
debug cch323 videoTo provide debugging output for video components within the H.323 subsystem, use thedebugcch323videocommandinprivilegedEXECmode.To disable debugging output, use the noform of thiscommand.
debug cch323 video
no debug cch323 video
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationCisco IOS Release
This command was introduced.12.4(4)XC
This command was integrated into Cisco IOS Release 12.4(9)T.12.4(9)T
Usage Guidelines Use this command to enable a debugging trace for the video component in an H.323 network.
Examples
Examples The following is sample output of the debugging log for an originating Cisco Unified CallManager Express(Cisco Unified CME) gateway after the debugcch323video command was enabled:
Router# show logSyslog logging: enabled (11 messages dropped, 487 messages rate-limited,
0 flushes, 0 overruns, xml disabled, filtering disabled)Console logging: disabledMonitor logging: level debugging, 0 messages logged, xml disabled,
filtering disabledBuffer logging: level debugging, 1144 messages logged, xml disabled,
filtering disabledLogging Exception size (4096 bytes)Count and timestamp logging messages: disabledTrap logging: level informational, 1084 message lines logged
Log Buffer (6000000 bytes):Jun 13 09:19:42.006: //103030/C7838B198002/H323/cch323_get_peer_info: EntryJun 13 09:19:42.006: //103030/C7838B198002/H323/cch323_get_peer_info: Have peerJun 13 09:19:42.006: //103030/C7838B198002/H323/cch323_set_pref_codec_list: First preferredcodec(bytes)=16(20)Jun 13 09:19:42.006: //103030/C7838B198002/H323/cch323_get_peer_info: Flow Mode set toFLOW_THROUGHJun 13 09:19:42.006: //103030/C7838B198002/H323/cch323_get_caps_chn_info: No peer leg setupparamsJun 13 09:19:42.006: //103030/C7838B198002/H323/cch323_get_caps_chn_info: SettingCCH323_SS_NTFY_VIDEO_INFOJun 13 09:19:42.006: //103030/C7838B198002/H323/cch323_set_h323_control_options_outgoing:h245 sm mode = 8463
Cisco IOS Debug Command Reference - Commands A through D266
debug backhaul-session-manager session through debug channel packetsdebug cch323 video
Jun 13 09:19:42.006: //103030/C7838B198002/H323/cch323_set_h323_control_options_outgoing:h323_ctl=0x20Jun 13 09:19:42.010: //103030/C7838B198002/H323/cch323_rotary_validate: No peer_ccb available
Examples The following is sample output of the debugging log for a terminating Cisco Unified Survivable Remote SiteTelephony (Cisco Unified SRST) gateway after the debugcch323video command was enabled:
Router# show logSyslog logging: enabled (11 messages dropped, 466 messages rate-limited,
0 flushes, 0 overruns, xml disabled, filtering disabled)Console logging: disabledMonitor logging: level debugging, 0 messages logged, xml disabled,
filtering disabledBuffer logging: level debugging, 829 messages logged, xml disabled,
filtering disabledLogging Exception size (4096 bytes)Count and timestamp logging messages: disabledTrap logging: level informational, 771 message lines logged
Log Buffer (200000 bytes):Jun 13 09:19:42.011: //103034/C7838B198002/H323/setup_ind: Receive bearer cap infoXRate 24,rateMult 12Jun 13 09:19:42.011: //103034/C7838B198002/H323/cch323_set_h245_state_mc_mode_incoming:h245 state m/c mode=0x10F, h323_ctl=0x2FJun 13 09:19:42.015: //-1/xxxxxxxxxxxx/H323/cch245_event_handler: callID=103034Jun 13 09:19:42.019: //-1/xxxxxxxxxxxx/H323/cch245_event_handler: Event CC_EV_H245_SET_MODE:data ptr=0x465D5760Jun 13 09:19:42.019: //-1/xxxxxxxxxxxx/H323/cch323_set_mode: callID=103034, flow Mode=1spi_mode=0x6Jun 13 09:19:42.019: //103034/C7838B198002/H323/cch323_do_call_proceeding: set_mode NOTcalled yet...saved deferred CALL_PROCJun 13 09:19:42.019: //103034/C7838B198002/H323/cch323_h245_connection_sm: state=0, event=0,ccb=4461B518, listen state=0Jun 13 09:19:42.019: //103034/C7838B198002/H323/cch323_process_set_mode: Setting inboundleg mode flags to 0x10F, flow-mode to FLOW_THROUGHJun 13 09:19:42.019: //103034/C7838B198002/H323/cch323_process_set_mode: Sending deferredCALL_PROCJun 13 09:19:42.019: //103034/C7838B198002/H323/cch323_do_call_proceeding: set_mode calledso we can proceed with CALLPROCJun 13 09:19:42.027: //103034/C7838B198002/H323/cch323_h245_connection_sm: state=1, event=2,ccb=4461B518, listen state=1Jun 13 09:19:42.027: //103034/C7838B198002/H323/cch323_send_cap_request: Setting mode toVIDEO MODEJun 13 09:19:42.031: //103034/C7838B198002/H323/cch323_h245_cap_ind: Masks au=0xC data=0x2uinp=0x32
Related Commands DescriptionCommand
Sets video debugging for the Cisco Unified IP phone.debug ephone video
Displays call information for SCCP video calls inprogress.
show call active video
Displays call history information for SCCP videocalls.
show call history video
Displays information about the types of debuggingthat are enabled for your router.
show debugging
Cisco IOS Debug Command Reference - Commands A through D 267
debug backhaul-session-manager session through debug channel packetsdebug cch323 video
debug ccm-managerTo display debugging information about Cisco CallManager, use the debugccm-manager command inprivileged EXEC mode. To disable debugging output, use the no form of this command.
debug ccm-manager {backhaul {errors| events| packets}| config-download {all| errors| events| packets|tone| xml}| errors| events|music-on-hold {errors| events| packets}| packets}
no debug ccm-manager
Syntax Description Enables debugging of the Cisco CallManagerbackhaul. The keywords are as follows:
• errors --Displays Cisco CallManager backhaulerrors.
• events --Displays Cisco CallManager backhaulevents.
• packets --Displays Cisco CallManager packets.
backhaul
Enables debugging of the Cisco CallManagerconfiguration download. The keywords are as follows:
• all --Displays all Cisco CallManagerconfiguration parameters.
• errors --Displays Cisco CallManagerconfiguration errors.
• events --Displays Cisco CallManagerconfiguration events.
• packets --Displays Cisco CallManagerconfiguration packets.
• tone --Displays Cisco CallManager downloadedcustom tones.
• xml --Displays the Cisco CallManagerconfiguration XML parser.
config-download
Displays errors related to Cisco CallManager.errors
Displays Cisco CallManager events, such as whenthe primary Cisco CallManager server fails andcontrol is switched to the backup Cisco CallManagerserver.
events
Cisco IOS Debug Command Reference - Commands A through D268
debug backhaul-session-manager session through debug channel packetsdebug ccm-manager
Displays music on hold (MOH). The keywords areas follows:
• errors --Displays MOH errors.
• events --Displays MOH events.
• packets --Displays MOH packets.
music-on-hold
Displays Cisco CallManager packets.packets
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced for Cisco CallManager Version 3.0 and the CiscoVG200.
12.1(3)T
This command was implemented on Cisco 2600 series and Cisco 3600 seriesrouters.
12.2(2)XA
Support for enhanced MGCP voice gateway interoperability was added to CiscoCallManager Version 3.1 for the Cisco 2600 series, Cisco 3600 series, and CiscoVG200.
12.2(2)XN
This commandwas integrated into Cisco IOSRelease 12.2(11)T and implementedon the Cisco IAD2420 series.
12.2(11)T
The tone keyword was added for the following platforms: Cisco 2610XM, Cisco611XM, Cisco 2620XM, Cisco 2621XM, Cisco 2650XM, Cisco 2651XM, Cisco2691, Cisco 3640A, Cisco 3660, Cisco 3725, and Cisco 3745.
12.2(15)XJ
The tone keyword was added.12.3(4)T
New output was added relating to the SCCP protocol.12.3(14)T
This command is supported in the Cisco IOS Release 12.2SX train. Support ina specific 12.2SX release of this train depends on your feature set, platform, andplatform hardware.
12.2SX
Examples The following is sample output from the debugccm-managerevents command:
Router# debug ccm-manager events*Feb 28 22:56:05.873: cmapp_mgcpapp_go_down: Setting mgc status to NO_RESPONSE*Feb 28 22:56:05.873: cmapp_host_fsm: New state DOWN for host 0 (172.20.71.38)*Feb 28 22:56:05.873: cmapp_mgr_process_ev_active_host_failed: Active host 0 (172.20.71.38)failed*Feb 28 22:56:05.873: cmapp_mgr_check_hostlist: Active host is 0 (172.20.71.38)
Cisco IOS Debug Command Reference - Commands A through D 269
debug backhaul-session-manager session through debug channel packetsdebug ccm-manager
*Feb 28 22:56:05.877: cmapp_mgr_switchover: New actv host will be 1 (172.20.71.44)*Feb 28 22:56:05.877: cmapp_host_fsm: Processing event GO_STANDBY for host 0 (172.20.71.38)in state DOWN*Feb 28 22:56:05.877: cmapp_open_new_link: Open link for [0]:172.20.71.38*Feb 28 22:56:05.877: cmbh_open_tcp_link: Opening TCP link with Rem IP 172.20.71.38, LocalIP 172.20.71.19, port 2428*Feb 28 22:56:05.881: cmapp_open_new_link: Open initiated OK: Host 0 (172.20.71.38),session_id=8186DEE4*Feb 28 22:56:05.881: cmapp_start_open_link_tmr: Host 0 (172.20.71.38), tmr 0*Feb 28 22:56:05.881: cmapp_host_fsm: New state STANDBY_OPENING for host 0 (172.20.71.38)*Feb 28 22:56:05.881: cmapp_host_fsm: Processing event GO_ACTIVE for host 1 (172.20.71.44)in state STANDBY_READY*Feb 28 22:56:05.885: cmapp_mgr_send_rehome: new addr=172.20.71.44,port=2427*Feb 28 22:56:05.885: cmapp_host_fsm: New state REGISTERING for host 1 (172.20.71.44)
You can use the debugccm-managerconfig-downloadtone command to verify the parameters assigned toeach locale. The following sample output shows the locale name United Kingdom and lists all the dual-toneparameters for that region:
Router# debug ccm-manager config-download tone00:09:07:cmapp_prefix_process_tag_tones:00:09:07: cmapp_process_tag_trkLocaleName: region = United Kingdom00:09:07: cmapp_process_tag_pulse_ratio: pulse ratio = 4000:09:07: cmapp_process_tag_dtmf_llevel: low frequency level = 6543800:09:07: cmapp_process_tag_dtmf_hlevel: high frequency level = 6546300:09:07: cmapp_process_tag_special_oper: operation = uLaw00:09:07: cmapp_prefix_process_tag_lpig:00:09:07: cmapp_process_tag_fxs: ignore LPIG for fxs00:09:07: cmapp_process_tag_fxo: ignore LPIG for fxo00:09:07: cmapp_process_tag_digital: ignore LPIG for digital00:09:07: cmapp_prefix_process_tag_lpog:00:09:07: cmapp_process_tag_fxs: ignore LPOG for fxsBoth ports are in service00:09:07: cmapp_process_tag_fxo: ignore LPOG for fxo00:09:07: cmapp_process_tag_digital: ignore LPOG for digital00:09:07: cmapp_prefix_process_tag_tonetable_info:00:09:07:cmapp_prefix_process_tag_dualtone: TID=[0:CPTONE_BUSY]00:09:07: cmapp_process_tag_nf: number of frequencies = 100:09:07: cmapp_process_tag_dr: direction = 000:09:07: cmapp_process_tag_fof: frequency 1 = 40000:09:07: cmapp_process_tag_fos: frequency 2 = 000:09:07: cmapp_process_tag_fot: frequency 3 = 000:09:07: cmapp_process_tag_fo4: frequency 4 = 000:09:07: cmapp_prefix_process_tag_aof_level:00:09:07: cmapp_process_tag_fxs: amplitude of 1st = -20000:09:07: cmapp_process_tag_fxo: amplitude of 1st = -20000:09:07: cmapp_process_tag_digital: amplitude of 1st = -24000:09:07: cmapp_prefix_process_tag_aos_level:00:09:07: cmapp_process_tag_fxs: amplitude of 2nd = 000:09:07: cmapp_process_tag_fxo: amplitude of 2nd = 000:09:07: cmapp_process_tag_digital: amplitude of 2nd = 000:09:07: cmapp_prefix_process_tag_aot_level:00:09:07: cmapp_process_tag_fxs: amplitude of 3rd = 000:09:07: cmapp_process_tag_fxo: amplitude of 3rd = 000:09:07: cmapp_process_tag_digital: amplitude of 3rd = 000:09:07: cmapp_prefix_process_tag_ao4_level:00:09:07: cmapp_process_tag_fxs: amplitude of 4th = 000:09:07: cmapp_process_tag_fxo: amplitude of 4th = 000:09:07: cmapp_process_tag_digital: amplitude of 4th = 000:09:07: cmapp_process_tag_ontf: frequency 1 on time = 37500:09:07: cmapp_process_tag_oftf: frequency 1 off time = 37500:09:07: cmapp_process_tag_onts: frequency 2 on time = 000:09:07: cmapp_process_tag_ofts: frequency 2 off time = 000:09:07: cmapp_process_tag_ontt: frequency 3 on time = 000:09:07: cmapp_process_tag_oftt: frequency 3 off time = 000:09:07: cmapp_process_tag_ont4: frequency 4 on time = 000:09:07: cmapp_process_tag_oft4: frequency 4 off time = 000:09:07: cmapp_process_tag_fof2: frequency 1 cadence 2 = 000:09:07: cmapp_process_tag_fos2: frequency 2 cadence 2 = 000:09:07: cmapp_process_tag_fof3: frequency 1 cadence 3 = 0
Cisco IOS Debug Command Reference - Commands A through D270
debug backhaul-session-manager session through debug channel packetsdebug ccm-manager
00:09:07: cmapp_process_tag_fos3: frequency 2 cadence 3 = 000:09:07: cmapp_process_tag_fof4: frequency 1 cadence 4 = 000:09:07: cmapp_process_tag_fos4: frequency 2 cadence 4 = 000:09:07: cmapp_process_tag_rct1: cadence 1 repeat count = 000:09:07: cmapp_process_tag_rct2: cadence 2 repeat count = 000:09:07: cmapp_process_tag_rct3: cadence 3 repeat count = 000:09:07: cmapp_process_tag_rct4: cadence 4 repeat count = 000:09:07:cmapp_prefix_process_tag_dualtone: TID=[1:CPTONE_RING_BACK]00:09:07: cmapp_process_tag_nf: number of frequencies = 200:09:07: cmapp_process_tag_dr: direction = 000:09:07: cmapp_process_tag_fof: frequency 1 = 40000:09:07: cmapp_process_tag_fos: frequency 2 = 45000:09:07: cmapp_process_tag_fot: frequency 3 = 000:09:07: cmapp_process_tag_fo4: frequency 4 = 000:09:07: cmapp_prefix_process_tag_aof_level:00:09:07: cmapp_process_tag_fxs: amplitude of 1st = -19000:09:07: cmapp_process_tag_fxo: amplitude of 1st = -19000:09:07: cmapp_process_tag_digital: amplitude of 1st = -19000:09:07: cmapp_prefix_process_tag_aos_level:00:09:07: cmapp_process_tag_fxs: amplitude of 2nd = -19000:09:07: cmapp_process_tag_fxo: amplitude of 2nd = -19000:09:07: cmapp_process_tag_digital: amplitude of 2nd = -19000:09:07: cmapp_prefix_process_tag_aot_level:00:09:07: cmapp_process_tag_fxs: amplitude of 3rd = 000:09:07: cmapp_process_tag_fxo: amplitude of 3rd = 000:09:07: cmapp_process_tag_digital: amplitude of 3rd = 000:09:07: cmapp_prefix_process_tag_ao4_level:00:09:07: cmapp_process_tag_fxs: amplitude of 4th = 000:09:07: cmapp_process_tag_fxo: amplitude of 4th = 000:09:07: cmapp_process_tag_digital: amplitude of 4th = 000:09:07: cmapp_process_tag_ontf: frequency 1 on time = 40000:09:07: cmapp_process_tag_oftf: frequency 1 off time = 20000:09:07: cmapp_process_tag_onts: frequency 2 on time = 40000:09:07: cmapp_process_tag_ofts: frequency 2 off time = 200000:09:07: cmapp_process_tag_ontt: frequency 3 on time = 000:09:07: cmapp_process_tag_oftt: frequency 3 off time = 000:09:07: cmapp_process_tag_ont4: frequency 4 on time = 000:09:07: cmapp_process_tag_oft4: frequency 4 off time = 000:09:07: cmapp_process_tag_fof2: frequency 1 cadence 2 = 000:09:07: cmapp_process_tag_fos2: frequency 2 cadence 2 = 000:09:07: cmapp_process_tag_fof3: frequency 1 cadence 3 = 000:09:07: cmapp_process_tag_fos3: frequency 2 cadence 3 = 000:09:07: cmapp_process_tag_fof4: frequency 1 cadence 4 = 000:09:07: cmapp_process_tag_fos4: frequency 2 cadence 4 = 000:09:07: cmapp_process_tag_rct1: cadence 1 repeat count = 000:09:07: cmapp_process_tag_rct2: cadence 2 repeat count = 000:09:07: cmapp_process_tag_rct3: cadence 3 repeat count = 000:09:07: cmapp_process_tag_rct4: cadence 4 repeat count = 000:09:07:cmapp_prefix_process_tag_dualtone: TID=[2:CPTONE_CONGESTION]00:09:07: cmapp_process_tag_nf: number of frequencies = 100:09:07: cmapp_process_tag_dr: direction = 000:09:07: cmapp_process_tag_fof: frequency 1 = 40000:09:07: cmapp_process_tag_fos: frequency 2 = 000:09:07: cmapp_process_tag_fot: frequency 3 = 000:09:07: cmapp_process_tag_fo4: frequency 4 = 000:09:07: cmapp_prefix_process_tag_aof_level:00:09:07: cmapp_process_tag_fxs: amplitude of 1st = -20000:09:07: cmapp_process_tag_fxo: amplitude of 1st = -20000:09:07: cmapp_process_tag_digital: amplitude of 1st = -20000:09:07: cmapp_prefix_process_tag_aos_level:00:09:07: cmapp_process_tag_fxs: amplitude of 2nd = 000:09:07: cmapp_process_tag_fxo: amplitude of 2nd = 000:09:07: cmapp_process_tag_digital: amplitude of 2nd = 000:09:07: cmapp_prefix_process_tag_aot_level:00:09:07: cmapp_process_tag_fxs: amplitude of 3rd = 000:09:07: cmapp_process_tag_fxo: amplitude of 3rd = 000:09:07: cmapp_process_tag_digital: amplitude of 3rd = 000:09:07: cmapp_prefix_process_tag_ao4_level:00:09:07: cmapp_process_tag_fxs: amplitude of 4th = 000:09:07: cmapp_process_tag_fxo: amplitude of 4th = 000:09:07: cmapp_process_tag_digital: amplitude of 4th = 0
Cisco IOS Debug Command Reference - Commands A through D 271
debug backhaul-session-manager session through debug channel packetsdebug ccm-manager
00:09:07: cmapp_process_tag_ontf: frequency 1 on time = 40000:09:07: cmapp_process_tag_oftf: frequency 1 off time = 35000:09:07: cmapp_process_tag_onts: frequency 2 on time = 22500:09:07: cmapp_process_tag_ofts: frequency 2 off time = 52500:09:07: cmapp_process_tag_ontt: frequency 3 on time = 000:09:07: cmapp_process_tag_oftt: frequency 3 off time = 000:09:07: cmapp_process_tag_ont4: frequency 4 on time = 000:09:07: cmapp_process_tag_oft4: frequency 4 off time = 000:09:07: cmapp_process_tag_fof2: frequency 1 cadence 2 = 000:09:07: cmapp_process_tag_fos2: frequency 2 cadence 2 = 000:09:07: cmapp_process_tag_fof3: frequency 1 cadence 3 = 000:09:07: cmapp_process_tag_fos3: frequency 2 cadence 3 = 000:09:07: cmapp_process_tag_fof4: frequency 1 cadence 4 = 000:09:07: cmapp_process_tag_fos4: frequency 2 cadence 4 = 000:09:07: cmapp_process_tag_rct1: cadence 1 repeat count = 000:09:07: cmapp_process_tag_rct2: cadence 2 repeat count = 000:09:07: cmapp_process_tag_rct3: cadence 3 repeat count = 000:09:07: cmapp_process_tag_rct4: cadence 4 repeat count = 0! endThe following is sample output from the debugccm-managerconfig-downloadallcommand for an error casein which the configuration file cannot be accessed for a Skinny Client Control Protocol (SCCP) download:
*Jan 9 07:28:33.499: cmapp_xml_process_timer:*Jan 9 07:28:33.499: cmapp_xml_find_ep_by_name: Checking for ep_name [*]*Jan 9 07:28:33.499: cmapp_xml_exec_fsm: Endpoint is [*]*Jan 9 07:28:33.499: cmapp_xml_exec_fsm: endpoint = * state = CMAPP_XML_FILE_DNLD, event= CMAPP_XML_EVT_FILE_DNLD_TIMER*Jan 9 07:28:33.499: cmapp_xml_file_retry_timer_expired: state = CMAPP_XML_FILE_DNLD, event= CMAPP_XML_EVT_FILE_DNLD_TIMER*Jan 9 07:29:14.499: cmapp_xml_tftp_download_file: Unable to read filetftp://10.6.6.31/Router.cisco.com.cnf.xml, rc=-2*Jan 9 07:29:14.499: cmapp_xml_get_xml_file: Could not read filetftp://10.6.6.31/Router.cisco.com.cnf.xml, len = 0*Jan 9 07:29:14.499: cmapp_xml_tftp_download_file: Unable to read filetftp:///Router.cisco.com.cnf.xml, rc=-2*Jan 9 07:29:14.499: cmapp_xml_get_xml_file: Could not read filetftp:///Router.cisco.com.cnf.xml, len = 0*Jan 9 07:29:14.499: cmapp_xml_tftp_download_file: Unable to read filetftp:///Router.cisco.com.cnf.xml, rc=-2*Jan 9 07:29:14.499: cmapp_xml_get_xml_file: Could not read filetftp:///Router.cisco.com.cnf.xml, len = 0*Jan 9 07:29:14.499: cmapp_xml_exec_fsm: New state = CMAPP_XML_FILE_DNLD, ep = 6544CFA8The following is sample output from the debugccm-managerconfig-downloadallcommand for a successfulSCCP download:
*Jan 9 09:44:45.543: cmapp_sccp_config:*Jan 9 09:44:45.543: cmapp_sccp_reset_curcfg:*Jan 9 09:44:45.543: cmapp_sccp_init_curcfg:*Jan 9 09:44:45.543: cmapp_sccp_download_gw_config_file:*Jan 9 09:44:45.543: cmapp_sccp_get_gw_name:*Jan 9 09:44:45.543: cmapp_sccp_get_gw_name: XML file name generated->SKIGW0C85226910.cnf.xml*Jan 9 09:44:45.543: cmapp_sccp_get_xml_file_via_tftp:*Jan 9 09:44:45.543: cmapp_sccp_tftp_download_file:*Jan 9 09:44:45.543: cmapp_sccp_tftp_get_file_size:*Jan 9 09:44:45.563: cmapp_sccp_get_buffer:*Jan 9 09:44:45.575: cmapp_sccp_tftp_download_file: File(tftp://10.2.6.101/SKIGW0C85226910.cnf.xml) read 8162 bytes*Jan 9 09:44:45.575: cmapp_sccp_get_xml_file_via_tftp: Read filetftp://10.2.6.101/SKIGW0C85226910.cnf.xml, len = 8162*Jan 9 09:44:45.575: cmapp_parse_gw_xml_file:*Jan 9 09:44:45.579: cmapp_sccp_gw_chardata_handler: ccm found, priority=0The following lines show the conversion of XML data into router configuration information for the endpoint:
*Jan 9 09:44:45.579: cmapp_sccp_gw_start_element_handler: Unit has been set to 1*Jan 9 09:44:45.579: cmapp_sccp_gw_start_element_handler: Subunit has been set to 0*Jan 9 09:44:45.579: cmapp_sccp_gw_start_element_handler: Endpoint has been set to 0*Jan 9 09:44:45.579: cmapp_sccp_gw_start_element_handler: Endpoint has been set to 1*Jan 9 09:44:45.579: cmapp_sccp_gw_start_element_handler: Endpoint has been set to 2*Jan 9 09:44:45.579: cmapp_sccp_gw_start_element_handler: Endpoint has been set to 3
Cisco IOS Debug Command Reference - Commands A through D272
debug backhaul-session-manager session through debug channel packetsdebug ccm-manager
*Jan 9 09:44:45.579: cmapp_sccp_gw_start_element_handler: Subunit has been set to 1*Jan 9 09:44:45.579: cmapp_sccp_gw_start_element_handler: Endpoint has been set to 0*Jan 9 09:44:45.579: cmapp_sccp_gw_start_element_handler: Endpoint has been set to 1*Jan 9 09:44:45.579: cmapp_sccp_gw_start_element_handler: Unit has been set to 2The table below describes the significant fields shown in the displays.
Table 50: debug ccm-manager Field Descriptions
DescriptionField
Timestamp time in hours (military format), minutes,and seconds that indicates when the CiscoCallManager event occurred.
nn :nn :nn :
The Cisco CallManager routine in which the errorevent occurred.
cmapp_ error message:
Region name, such as United Kingdom.LocaleName
DTMF low frequency.low frequency level
DTMF high frequency.high frequency level
Special operations, such as uLaw.operation
Related Commands DescriptionCommand
Displays a list of Cisco CallManager servers, theircurrent status, and their availability.
show ccm-manager
Cisco IOS Debug Command Reference - Commands A through D 273
debug backhaul-session-manager session through debug channel packetsdebug ccm-manager
debug ccsip allTo enable all Session Initiation Protocol (SIP)-related debugging, use the debugccsipall command in privilegedEXEC mode. To disable debugging output, use the no form of this command.
debug ccsip all
no debug ccsip all
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History This command was introduced.12.1(1)T
The output of this command was changed.12.1.(3)T
Support was added for the Cisco AS5350 and Cisco AS5400 universal gateways.12.2(2)XA
This command was implemented on the Cisco AS5850 universal gateway.12.2(2)XB1
This commandwas integrated into Cisco IOSRelease 12.2(8)T and implementedon Cisco 7200 series routers.
12.2(8)T
This command was integrated into Cisco IOS Release 12.2(11)T. Support forthe Cisco AS5300 universal access server, Cisco AS5350, Cisco AS5400, andCisco AS5850 universal gateway is not included in this release.
12.2(11)T
Usage Guidelines The debugccsipall command enables the following SIP debug commands:
• debug ccsip events
• debug ccsip error
• debug ccsip states
• debug ccsip messages
• debug ccsip calls
Examples The following example displays debug output from one side of the call:
Router# debug ccsip all
Cisco IOS Debug Command Reference - Commands A through D274
debug backhaul-session-manager session through debug channel packetsdebug ccsip all
All SIP call tracing enabledRouter1#*Mar 6 14:10:42: 0x624CFEF8 : State change from (STATE_NONE, SUBSTATE_NONE) to (STATE_IDLE,SUBSTATE_NONE)*Mar 6 14:10:42: Queued event from SIP SPI : SIPSPI_EV_CC_CALL_SETUP*Mar 6 14:10:42: CCSIP-SPI-CONTROL: act_idle_call_setup*Mar 6 14:10:42: act_idle_call_setup:Not using Voice Class Codec*Mar 6 14:10:42: act_idle_call_setup: preferred_codec set[0] type :g711ulaw bytes: 160*Mar 6 14:10:42: Queued event from SIP SPI : SIPSPI_EV_CREATE_CONNECTION*Mar 6 14:10:42: 0x624CFEF8 : State change from (STATE_IDLE, SUBSTATE_NONE) to (STATE_IDLE,SUBSTATE_CONNECTING)*Mar 6 14:10:42: REQUEST CONNECTION TO IP:166.34.245.231 PORT:5060*Mar 6 14:10:42: 0x624CFEF8 : State change from (STATE_IDLE, SUBSTATE_CONNECTING) to(STATE_IDLE, SUBSTATE_CONNECTING)*Mar 6 14:10:42: CCSIP-SPI-CONTROL: act_idle_connection_created*Mar 6 14:10:42: CCSIP-SPI-CONTROL: act_idle_connection_created: Connid(1) created to166.34.245.231:5060, local_port 54113*Mar 6 14:10:42: sipSPIAddLocalContact*Mar 6 14:10:42: Queued event from SIP SPI : SIPSPI_EV_SEND_MESSAGE*Mar 6 14:10:42: CCSIP-SPI-CONTROL: sip_stats_method*Mar 6 14:10:42: 0x624CFEF8 : State change from (STATE_IDLE, SUBSTATE_CONNECTING) to(STATE_SENT_INVITE, SUBSTATE_NONE)*Mar 6 14:10:42: Sent:INVITE sip:[email protected];user=phone;phone-context=unknown SIP/2.0Via: SIP/2.0/UDP 166.34.245.230:54113From: "3660110" <sip:[email protected]>To: <sip:[email protected];user=phone;phone-context=unknown>Date: Sat, 06 Mar 1993 19:10:42 GMTCall-ID: [email protected]: 2881152943-2184249548-0-483039712User-Agent: Cisco VoIP Gateway/ IOS 12.x/ SIP enabledCSeq: 101 INVITEMax-Forwards: 6Timestamp: 731427042Contact: <sip:[email protected]:5060;user=phone>Expires: 180Content-Type: application/sdpContent-Length: 137v=0o=CiscoSystemsSIP-GW-UserAgent 1212 283 IN IP4 166.34.245.230s=SIP Callt=0 0c=IN IP4 166.34.245.230m=audio 20208 RTP/AVP 0*Mar 6 14:10:42: Received:SIP/2.0 100 TryingVia: SIP/2.0/UDP 166.34.245.230:54113From: "3660110" <sip:[email protected]>To: <sip:[email protected];user=phone;phone-context=unknown>Date: Mon, 08 Mar 1993 22:36:40 GMTCall-ID: [email protected]: 731427042Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabledCSeq: 101 INVITEContent-Length: 0*Mar 6 14:10:42: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.231:5060*Mar 6 14:10:42: CCSIP-SPI-CONTROL: act_sentinvite_new_message*Mar 6 14:10:42: CCSIP-SPI-CONTROL: sipSPICheckResponse*Mar 6 14:10:42: CCSIP-SPI-CONTROL: sip_stats_status_code*Mar 6 14:10:42: Roundtrip delay 4 milliseconds for method INVITE*Mar 6 14:10:42: 0x624CFEF8 : State change from (STATE_SENT_INVITE, SUBSTATE_NONE) to(STATE_RECD_PROCEEDING, SUBSTATE_PROCEEDING_PROCEEDING)*Mar 6 14:10:42: Received:SIP/2.0 180 RingingVia: SIP/2.0/UDP 166.34.245.230:54113From: "3660110" <sip:[email protected]>To: <sip:[email protected];user=phone;phone-context=unknown>Date: Mon, 08 Mar 1993 22:36:40 GMTCall-ID: [email protected]: 731427042Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabledCSeq: 101 INVITEContent-Type: application/sdp
Cisco IOS Debug Command Reference - Commands A through D 275
debug backhaul-session-manager session through debug channel packetsdebug ccsip all
Content-Length: 137v=0o=CiscoSystemsSIP-GW-UserAgent 969 7889 IN IP4 166.34.245.231s=SIP Callt=0 0c=IN IP4 166.34.245.231m=audio 20038 RTP/AVP 0*Mar 6 14:10:42: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.231:5060*Mar 6 14:10:42: CCSIP-SPI-CONTROL: act_recdproc_new_message*Mar 6 14:10:42: CCSIP-SPI-CONTROL: sipSPICheckResponse*Mar 6 14:10:42: CCSIP-SPI-CONTROL: sipSPICheckResponse : Updating session description*Mar 6 14:10:42: CCSIP-SPI-CONTROL: sip_stats_status_code*Mar 6 14:10:42: Roundtrip delay 8 milliseconds for method INVITE*Mar 6 14:10:42: HandleSIP1xxRinging: SDP MediaTypes negotiation successful!Negotiated Codec : g711ulaw , bytes :160Inband Alerting : 0*Mar 6 14:10:42: 0x624CFEF8 : State change from (STATE_RECD_PROCEEDING,SUBSTATE_PROCEEDING_PROCEEDING) to (STATE_RECD_PROCEEDING, SUBSTATE_PROCEEDING_ALERTING)*Mar 6 14:10:46: Received:SIP/2.0 200 OKVia: SIP/2.0/UDP 166.34.245.230:54113From: "3660110" <sip:[email protected]>To: <sip:[email protected];user=phone;phone-context=unknown>;tag=27D3FCA8-C7FDate: Mon, 08 Mar 1993 22:36:40 GMTCall-ID: [email protected]: 731427042Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabledContact: <sip:[email protected]:5060;user=phone>CSeq: 101 INVITEContent-Type: application/sdpContent-Length: 137v=0o=CiscoSystemsSIP-GW-UserAgent 969 7889 IN IP4 166.34.245.231s=SIP Callt=0 0c=IN IP4 166.34.245.231m=audio 20038 RTP/AVP 0*Mar 6 14:10:46: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.231:5060*Mar 6 14:10:46: CCSIP-SPI-CONTROL: act_recdproc_new_message*Mar 6 14:10:46: CCSIP-SPI-CONTROL: sipSPICheckResponse*Mar 6 14:10:46: CCSIP-SPI-CONTROL: sipSPICheckResponse : Updating session description*Mar 6 14:10:46: CCSIP-SPI-CONTROL: sip_stats_status_code*Mar 6 14:10:46: Roundtrip delay 3536 milliseconds for method INVITE*Mar 6 14:10:46: CCSIP-SPI-CONTROL: act_recdproc_new_message: SDP MediaTypes negotiationsuccessful!Negotiated Codec : g711ulaw , bytes :160*Mar 6 14:10:46: CCSIP-SPI-CONTROL: sipSPIReconnectConnection*Mar 6 14:10:46: Queued event from SIP SPI : SIPSPI_EV_RECONNECT_CONNECTION*Mar 6 14:10:46: CCSIP-SPI-CONTROL: recv_200_OK_for_invite*Mar 6 14:10:46: Queued event from SIP SPI : SIPSPI_EV_SEND_MESSAGE*Mar 6 14:10:46: CCSIP-SPI-CONTROL: sip_stats_method*Mar 6 14:10:46: 0x624CFEF8 : State change from (STATE_RECD_PROCEEDING,SUBSTATE_PROCEEDING_ALERTING) to (STATE_ACTIVE, SUBSTATE_NONE)*Mar 6 14:10:46: The Call Setup Information is :
Call Control Block (CCB) : 0x624CFEF8State of The Call : STATE_ACTIVETCP Sockets Used : NOCalling Number : 3660110Called Number : 3660210Negotiated Codec : g711ulawSource IP Address (Media): 166.34.245.230Source IP Port (Media): 20208Destn IP Address (Media): 166.34.245.231Destn IP Port (Media): 20038Destn SIP Addr (Control) : 166.34.245.231Destn SIP Port (Control) : 5060Destination Name : 166.34.245.231
*Mar 6 14:10:46: HandleUdpReconnection: Udp socket connected for fd: 1 with166.34.245.231:5060*Mar 6 14:10:46: Sent:ACK sip:[email protected]:5060;user=phone SIP/2.0Via: SIP/2.0/UDP 166.34.245.230:54113From: "3660110" <sip:[email protected]>
Cisco IOS Debug Command Reference - Commands A through D276
debug backhaul-session-manager session through debug channel packetsdebug ccsip all
To: <sip:[email protected];user=phone;phone-context=unknown>;tag=27D3FCA8-C7FDate: Sat, 06 Mar 1993 19:10:42 GMTCall-ID: [email protected]: 6Content-Type: application/sdpContent-Length: 137CSeq: 101 ACKv=0o=CiscoSystemsSIP-GW-UserAgent 1212 283 IN IP4 166.34.245.230s=SIP Callt=0 0c=IN IP4 166.34.245.230m=audio 20208 RTP/AVP 0*Mar 6 14:10:46: CCSIP-SPI-CONTROL: ccsip_caps_ind*Mar 6 14:10:46: ccsip_caps_ind: Load DSP with codec (5) g711ulaw, Bytes=160*Mar 6 14:10:46: ccsip_caps_ind: set DSP for dtmf-relay = CC_CAP_DTMF_RELAY_INBAND_VOICE*Mar 6 14:10:46: CCSIP-SPI-CONTROL: ccsip_caps_ack*Mar 6 14:10:50: Received:BYE sip:[email protected]:5060;user=phone SIP/2.0Via: SIP/2.0/UDP 166.34.245.231:54835From: <sip:[email protected];user=phone;phone-context=unknown>;tag=27D3FCA8-C7FTo: "3660110" <sip:[email protected]>Date: Mon, 08 Mar 1993 22:36:44 GMTCall-ID: [email protected]: Cisco VoIP Gateway/ IOS 12.x/ SIP enabledMax-Forwards: 6Timestamp: 731612207CSeq: 101 BYEContent-Length: 0*Mar 6 14:10:50: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.231:54835*Mar 6 14:10:50: CCSIP-SPI-CONTROL: act_active_new_message*Mar 6 14:10:50: CCSIP-SPI-CONTROL: sact_active_new_message_request*Mar 6 14:10:50: CCSIP-SPI-CONTROL: sip_stats_method*Mar 6 14:10:50: Queued event from SIP SPI : SIPSPI_EV_SEND_MESSAGE*Mar 6 14:10:50: CCSIP-SPI-CONTROL: sip_stats_status_code*Mar 6 14:10:50: CCSIP-SPI-CONTROL: sipSPIInitiateCallDisconnect : Initiate calldisconnect(16) for outgoing call*Mar 6 14:10:50: 0x624CFEF8 : State change from (STATE_ACTIVE, SUBSTATE_NONE) to(STATE_DISCONNECTING, SUBSTATE_NONE)*Mar 6 14:10:50: Sent:SIP/2.0 200 OKVia: SIP/2.0/UDP 166.34.245.231:54835From: <sip:[email protected];user=phone;phone-context=unknown>;tag=27D3FCA8-C7FTo: "3660110" <sip:[email protected]>Date: Sat, 06 Mar 1993 19:10:50 GMTCall-ID: [email protected]: Cisco VoIP Gateway/ IOS 12.x/ SIP enabledTimestamp: 731612207Content-Length: 0CSeq: 101 BYE*Mar 6 14:10:50: Queued event From SIP SPI to CCAPI/DNS : SIPSPI_EV_CC_CALL_DISCONNECT*Mar 6 14:10:50: CCSIP-SPI-CONTROL: act_disconnecting_disconnect*Mar 6 14:10:50: CCSIP-SPI-CONTROL: sipSPICallCleanup*Mar 6 14:10:50: Queued event from SIP SPI : SIPSPI_EV_CLOSE_CONNECTION*Mar 6 14:10:50: CLOSE CONNECTION TO CONNID:1*Mar 6 14:10:50: sipSPIIcpifUpdate :CallState: 4 Playout: 1755 DiscTime:48305031 ConnTime48304651*Mar 6 14:10:50: 0x624CFEF8 : State change from (STATE_DISCONNECTING, SUBSTATE_NONE) to(STATE_DEAD, SUBSTATE_NONE)*Mar 6 14:10:50: The Call Setup Information is :
Call Control Block (CCB) : 0x624CFEF8State of The Call : STATE_DEADTCP Sockets Used : NOCalling Number : 3660110Called Number : 3660210Negotiated Codec : g711ulawSource IP Address (Media): 166.34.245.230Source IP Port (Media): 20208Destn IP Address (Media): 166.34.245.231Destn IP Port (Media): 20038Destn SIP Addr (Control) : 166.34.245.231Destn SIP Port (Control) : 5060Destination Name : 166.34.245.231
Cisco IOS Debug Command Reference - Commands A through D 277
debug backhaul-session-manager session through debug channel packetsdebug ccsip all
*Mar 6 14:10:50:Disconnect Cause (CC) : 16Disconnect Cause (SIP) : 200
*Mar 6 14:10:50: udpsock_close_connect: Socket fd: 1 closed for connid 1 with remote port:5060The following example displays debut output from the other side of the call:
Router# debug ccsip allAll SIP call tracing enabled3660-2#*Mar 8 17:36:40: Received:INVITE sip:[email protected];user=phone;phone-context=unknown SIP/2.0Via: SIP/2.0/UDP 166.34.245.230:54113From: "3660110" <sip:[email protected]>To: <sip:[email protected];user=phone;phone-context=unknown>Date: Sat, 06 Mar 1993 19:10:42 GMTCall-ID: [email protected]: 2881152943-2184249548-0-483039712User-Agent: Cisco VoIP Gateway/ IOS 12.x/ SIP enabledCSeq: 101 INVITEMax-Forwards: 6Timestamp: 731427042Contact: <sip:[email protected]:5060;user=phone>Expires: 180Content-Type: application/sdpContent-Length: 137v=0o=CiscoSystemsSIP-GW-UserAgent 1212 283 IN IP4 166.34.245.230s=SIP Callt=0 0c=IN IP4 166.34.245.230m=audio 20208 RTP/AVP 0*Mar 8 17:36:40: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.230:54113*Mar 8 17:36:40: CCSIP-SPI-CONTROL: sipSPISipIncomingCall*Mar 8 17:36:40: 0x624D8CCC : State change from (STATE_NONE, SUBSTATE_NONE) to (STATE_IDLE,SUBSTATE_NONE)*Mar 8 17:36:40: CCSIP-SPI-CONTROL: act_idle_new_message*Mar 8 17:36:40: CCSIP-SPI-CONTROL: sact_idle_new_message_invite*Mar 8 17:36:40: CCSIP-SPI-CONTROL: sip_stats_method*Mar 8 17:36:40: sact_idle_new_message_invite:Not Using Voice Class Codec*Mar 8 17:36:40: sact_idle_new_message_invite: Preferred codec[0] type: g711ulaw Bytes:160*Mar 8 17:36:40: sact_idle_new_message_invite: Media Negotiation successful for anincoming call*Mar 8 17:36:40: sact_idle_new_message_invite: Negotiated Codec : g711ulaw, bytes:160Preferred Codec : g711ulaw, bytes :160*Mar 8 17:36:40: Queued event from SIP SPI : SIPSPI_EV_SEND_MESSAGE*Mar 8 17:36:40: CCSIP-SPI-CONTROL: sip_stats_status_code*Mar 8 17:36:40: Num of Contact Locations 1 3660110 166.34.245.230 5060*Mar 8 17:36:40: 0x624D8CCC : State change from (STATE_IDLE, SUBSTATE_NONE) to(STATE_RECD_INVITE, SUBSTATE_RECD_INVITE_CALL_SETUP)*Mar 8 17:36:40: Sent:SIP/2.0 100 TryingVia: SIP/2.0/UDP 166.34.245.230:54113From: "3660110" <sip:[email protected]>To: <sip:[email protected];user=phone;phone-context=unknown>Date: Mon, 08 Mar 1993 22:36:40 GMTCall-ID: [email protected]: 731427042Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabledCSeq: 101 INVITEContent-Length: 0*Mar 8 17:36:40: Queued event From SIP SPI to CCAPI/DNS : SIPSPI_EV_CC_CALL_PROCEEDING*Mar 8 17:36:40: CCSIP-SPI-CONTROL: act_recdinvite_proceeding*Mar 8 17:36:40: Queued event From SIP SPI to CCAPI/DNS : SIPSPI_EV_CC_CALL_ALERTING*Mar 8 17:36:40: CCSIP-SPI-CONTROL: ccsip_caps_ind*Mar 8 17:36:40: ccsip_caps_ind: codec(negotiated) = 5(Bytes 160)*Mar 8 17:36:40: ccsip_caps_ind: Load DSP with codec (5) g711ulaw, Bytes=160*Mar 8 17:36:40: ccsip_caps_ind: set DSP for dtmf-relay = CC_CAP_DTMF_RELAY_INBAND_VOICE*Mar 8 17:36:40: CCSIP-SPI-CONTROL: ccsip_caps_ack*Mar 8 17:36:40: CCSIP-SPI-CONTROL: act_recdinvite_alerting
Cisco IOS Debug Command Reference - Commands A through D278
debug backhaul-session-manager session through debug channel packetsdebug ccsip all
*Mar 8 17:36:40: 180 Ringing with SDP - not likely*Mar 8 17:36:40: Queued event from SIP SPI : SIPSPI_EV_SEND_MESSAGE*Mar 8 17:36:40: CCSIP-SPI-CONTROL: sip_stats_status_code*Mar 8 17:36:40: 0x624D8CCC : State change from (STATE_RECD_INVITE,SUBSTATE_RECD_INVITE_CALL_SETUP) to (STATE_SENT_ALERTING, SUBSTATE_NONE)*Mar 8 17:36:40: Sent:SIP/2.0 180 RingingVia: SIP/2.0/UDP 166.34.245.230:54113From: "3660110" <sip:[email protected]>To: <sip:[email protected];user=phone;phone-context=unknown>Date: Mon, 08 Mar 1993 22:36:40 GMTCall-ID: [email protected]: 731427042Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabledCSeq: 101 INVITEContent-Type: application/sdpContent-Length: 137v=0o=CiscoSystemsSIP-GW-UserAgent 969 7889 IN IP4 166.34.245.231s=SIP Callt=0 0c=IN IP4 166.34.245.231m=audio 20038 RTP/AVP 0*Mar 8 17:36:44: Queued event From SIP SPI to CCAPI/DNS : SIPSPI_EV_CC_CALL_CONNECT*Mar 8 17:36:44: CCSIP-SPI-CONTROL: act_sentalert_connect*Mar 8 17:36:44: sipSPIAddLocalContact*Mar 8 17:36:44: Queued event from SIP SPI : SIPSPI_EV_SEND_MESSAGE*Mar 8 17:36:44: CCSIP-SPI-CONTROL: sip_stats_status_code*Mar 8 17:36:44: 0x624D8CCC : State change from (STATE_SENT_ALERTING, SUBSTATE_NONE) to(STATE_SENT_SUCCESS, SUBSTATE_NONE)*Mar 8 17:36:44: Sent:SIP/2.0 200 OKVia: SIP/2.0/UDP 166.34.245.230:54113From: "3660110" <sip:[email protected]>To: <sip:[email protected];user=phone;phone-context=unknown>;tag=27D3FCA8-C7FDate: Mon, 08 Mar 1993 22:36:40 GMTCall-ID: [email protected]: 731427042Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabledContact: <sip:[email protected]:5060;user=phone>CSeq: 101 INVITEContent-Type: application/sdpContent-Length: 137v=0o=CiscoSystemsSIP-GW-UserAgent 969 7889 IN IP4 166.34.245.231s=SIP Callt=0 0c=IN IP4 166.34.245.231m=audio 20038 RTP/AVP 0*Mar 8 17:36:44: Received:ACK sip:[email protected]:5060;user=phone SIP/2.0Via: SIP/2.0/UDP 166.34.245.230:54113From: "3660110" <sip:[email protected]>To: <sip:[email protected];user=phone;phone-context=unknown>;tag=27D3FCA8-C7FDate: Sat, 06 Mar 1993 19:10:42 GMTCall-ID: [email protected]: 6Content-Type: application/sdpContent-Length: 137CSeq: 101 ACKv=0o=CiscoSystemsSIP-GW-UserAgent 1212 283 IN IP4 166.34.245.230s=SIP Callt=0 0c=IN IP4 166.34.245.230m=audio 20208 RTP/AVP 0*Mar 8 17:36:44: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.230:54113*Mar 8 17:36:44: CCSIP-SPI-CONTROL: act_sentsucc_new_message*Mar 8 17:36:44: CCSIP-SPI-CONTROL: sip_stats_method*Mar 8 17:36:44: 0x624D8CCC : State change from (STATE_SENT_SUCCESS, SUBSTATE_NONE) to(STATE_ACTIVE, SUBSTATE_NONE)*Mar 8 17:36:44: The Call Setup Information is :
Call Control Block (CCB) : 0x624D8CCC
Cisco IOS Debug Command Reference - Commands A through D 279
debug backhaul-session-manager session through debug channel packetsdebug ccsip all
State of The Call : STATE_ACTIVETCP Sockets Used : NOCalling Number : 3660110Called Number : 3660210Negotiated Codec : g711ulawSource IP Address (Media): 166.34.245.231Source IP Port (Media): 20038Destn IP Address (Media): 166.34.245.230Destn IP Port (Media): 20208Destn SIP Addr (Control) : 166.34.245.230Destn SIP Port (Control) : 5060Destination Name : 166.34.245.230
*Mar 8 17:36:47: Queued event From SIP SPI to CCAPI/DNS : SIPSPI_EV_CC_CALL_DISCONNECT*Mar 8 17:36:47: CCSIP-SPI-CONTROL: act_active_disconnect*Mar 8 17:36:47: Queued event from SIP SPI : SIPSPI_EV_CREATE_CONNECTION*Mar 8 17:36:47: 0x624D8CCC : State change from (STATE_ACTIVE, SUBSTATE_NONE) to(STATE_ACTIVE, SUBSTATE_CONNECTING)*Mar 8 17:36:47: REQUEST CONNECTION TO IP:166.34.245.230 PORT:5060*Mar 8 17:36:47: 0x624D8CCC : State change from (STATE_ACTIVE, SUBSTATE_CONNECTING) to(STATE_ACTIVE, SUBSTATE_CONNECTING)*Mar 8 17:36:47: CCSIP-SPI-CONTROL: act_active_connection_created*Mar 8 17:36:47: CCSIP-SPI-CONTROL: sipSPICheckSocketConnection*Mar 8 17:36:47: CCSIP-SPI-CONTROL: sipSPICheckSocketConnection: Connid(1) created to166.34.245.230:5060, local_port 54835*Mar 8 17:36:47: Queued event from SIP SPI : SIPSPI_EV_SEND_MESSAGE*Mar 8 17:36:47: CCSIP-SPI-CONTROL: sip_stats_method*Mar 8 17:36:47: 0x624D8CCC : State change from (STATE_ACTIVE, SUBSTATE_CONNECTING) to(STATE_DISCONNECTING, SUBSTATE_NONE)*Mar 8 17:36:47: Sent:BYE sip:[email protected]:5060;user=phone SIP/2.0Via: SIP/2.0/UDP 166.34.245.231:54835From: <sip:[email protected];user=phone;phone-context=unknown>;tag=27D3FCA8-C7FTo: "3660110" <sip:[email protected]>Date: Mon, 08 Mar 1993 22:36:44 GMTCall-ID: [email protected]: Cisco VoIP Gateway/ IOS 12.x/ SIP enabledMax-Forwards: 6Timestamp: 731612207CSeq: 101 BYEContent-Length: 0*Mar 8 17:36:47: Received:SIP/2.0 200 OKVia: SIP/2.0/UDP 166.34.245.231:54835From: <sip:[email protected];user=phone;phone-context=unknown>;tag=27D3FCA8-C7FTo: "3660110" <sip:[email protected]>Date: Sat, 06 Mar 1993 19:10:50 GMTCall-ID: [email protected]: Cisco VoIP Gateway/ IOS 12.x/ SIP enabledTimestamp: 731612207Content-Length: 0CSeq: 101 BYE*Mar 8 17:36:47: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.230:54113*Mar 8 17:36:47: CCSIP-SPI-CONTROL: act_disconnecting_new_message*Mar 8 17:36:47: CCSIP-SPI-CONTROL: sact_disconnecting_new_message_response*Mar 8 17:36:47: CCSIP-SPI-CONTROL: sipSPICheckResponse*Mar 8 17:36:47: CCSIP-SPI-CONTROL: sip_stats_status_code*Mar 8 17:36:47: Roundtrip delay 4 milliseconds for method BYE*Mar 8 17:36:47: CCSIP-SPI-CONTROL: sipSPICallCleanup*Mar 8 17:36:47: Queued event from SIP SPI : SIPSPI_EV_CLOSE_CONNECTION*Mar 8 17:36:47: CLOSE CONNECTION TO CONNID:1*Mar 8 17:36:47: sipSPIIcpifUpdate :CallState: 4 Playout: 1265 DiscTime:66820800 ConnTime66820420*Mar 8 17:36:47: 0x624D8CCC : State change from (STATE_DISCONNECTING, SUBSTATE_NONE) to(STATE_DEAD, SUBSTATE_NONE)*Mar 8 17:36:47: The Call Setup Information is :
Call Control Block (CCB) : 0x624D8CCCState of The Call : STATE_DEADTCP Sockets Used : NOCalling Number : 3660110Called Number : 3660210Negotiated Codec : g711ulawSource IP Address (Media): 166.34.245.231Source IP Port (Media): 20038
Cisco IOS Debug Command Reference - Commands A through D280
debug backhaul-session-manager session through debug channel packetsdebug ccsip all
Destn IP Address (Media): 166.34.245.230Destn IP Port (Media): 20208Destn SIP Addr (Control) : 166.34.245.230Destn SIP Port (Control) : 5060Destination Name : 166.34.245.230
*Mar 8 17:36:47:Disconnect Cause (CC) : 16Disconnect Cause (SIP) : 200
*Mar 8 17:36:47: udpsock_close_connect: Socket fd: 1 closed for connid 1 with remote port:5060
Related Commands DescriptionCommand
Shows all SIP SPI call tracing.debug ccsip calls
Shows SIP SPI errors.debug ccsip error
Shows all SIP SPI events tracing.debug ccsip events
Shows all SIP SPI message tracing.debug ccsip info
Shows all SIP SPI state tracing.debug ccsip states
Cisco IOS Debug Command Reference - Commands A through D 281
debug backhaul-session-manager session through debug channel packetsdebug ccsip all
debug ccsip callsTo show all Session Initiation Protocol (SIP) Service Provider Interface (SPI) call tracing, use thedebugccsipcalls command in privileged EXEC mode. To disable debugging output, use the no form of thiscommand.
debug ccsip calls
no debug ccsip calls
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History This command was introduced.12.1(1)T
The output of this command was changed.12.1(3)T
Support was added for the Cisco AS5350 and Cisco AS5400 universal gateways.12.2(2)XA
This command was introduced on the Cisco AS5850 universal gateway.12.2(2)XB1
This commandwas integrated into Cisco IOSRelease 12.2(8)T and implementedon Cisco 7200 series routers.
12.2(8)T
This command was integrated into Cisco IOS Release 12.2(11)T. Support forthe Cisco AS5300 universal access server, Cisco AS5350, Cisco AS5400, andCisco AS5850 universal gateway is not included in this release.
12.2(11)T
Usage Guidelines This command traces the SIP call details as they are updated in the SIP call control block.
Examples The following example displays debug output from one side of the call:
Router1# debug ccsip callsSIP Call statistics tracing is enabledRouter1#*Mar 6 14:12:33: The Call Setup Information is :
Call Control Block (CCB) : 0x624D078CState of The Call : STATE_ACTIVETCP Sockets Used : NOCalling Number : 3660110Called Number : 3660210Negotiated Codec : g711ulawSource IP Address (Media): 166.34.245.230
Cisco IOS Debug Command Reference - Commands A through D282
debug backhaul-session-manager session through debug channel packetsdebug ccsip calls
Source IP Port (Media): 20644Destn IP Address (Media): 166.34.245.231Destn IP Port (Media): 20500Destn SIP Addr (Control) : 166.34.245.231Destn SIP Port (Control) : 5060Destination Name : 166.34.245.231
*Mar 6 14:12:40: The Call Setup Information is :Call Control Block (CCB) : 0x624D078CState of The Call : STATE_DEADTCP Sockets Used : NOCalling Number : 3660110Called Number : 3660210Negotiated Codec : g711ulawSource IP Address (Media): 166.34.245.230Source IP Port (Media): 20644Destn IP Address (Media): 166.34.245.231Destn IP Port (Media): 20500Destn SIP Addr (Control) : 166.34.245.231Destn SIP Port (Control) : 5060Destination Name : 166.34.245.231
*Mar 6 14:12:40:Disconnect Cause (CC) : 16Disconnect Cause (SIP) : 200
The following example displays debug output from the other side of the call:
Router2# debug ccsip callsSIP Call statistics tracing is enabledRouter2#*Mar 8 17:38:31: The Call Setup Information is :
Call Control Block (CCB) : 0x624D9560State of The Call : STATE_ACTIVETCP Sockets Used : NOCalling Number : 3660110Called Number : 3660210Negotiated Codec : g711ulawSource IP Address (Media): 166.34.245.231Source IP Port (Media): 20500Destn IP Address (Media): 166.34.245.230Destn IP Port (Media): 20644Destn SIP Addr (Control) : 166.34.245.230Destn SIP Port (Control) : 5060Destination Name : 166.34.245.230
*Mar 8 17:38:38: The Call Setup Information is:Call Control Block (CCB) : 0x624D9560State of The Call : STATE_DEADTCP Sockets Used : NOCalling Number : 3660110Called Number : 3660210Negotiated Codec : g711ulawSource IP Address (Media): 166.34.245.231Source IP Port (Media): 20500Destn IP Address (Media): 166.34.245.230Destn IP Port (Media): 20644Destn SIP Addr (Control) : 166.34.245.230Destn SIP Port (Control) : 5060Destination Name : 166.34.245.230
*Mar 8 17:38:38:Disconnect Cause (CC) : 16Disconnect Cause (SIP) : 200
Related Commands DescriptionCommand
Enables all SIP-related debugging.debug ccsip all
Shows SIP SPI errors.debug ccsip error
Shows all SIP SPI events tracing.debug ccsip events
Cisco IOS Debug Command Reference - Commands A through D 283
debug backhaul-session-manager session through debug channel packetsdebug ccsip calls
DescriptionCommand
Shows all SIP SPI message tracing.debug ccsip info
Shows all SIP SPI state tracing.debug ccsip states
Cisco IOS Debug Command Reference - Commands A through D284
debug backhaul-session-manager session through debug channel packetsdebug ccsip calls
debug ccsip dhcpTo display debugging related information on Session Initiation Protocol (SIP) and Dynamic Host ConfigurationProtocol (DHCP) interaction, when SIP parameters are provisoned by DHCP, use the debugccsipdhcpcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ccsip dhcp
no debug ccsip dhcp
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC (#)
Command History This command was introduced.12.4(22)YB
This command was integrated in Cisco IOS Release 15.0(1)M.15.0(1)M
Usage Guidelines The debug ccsip dhcp command can be enabled by executing the command itself or by issuing the debugccsip all command.
Examples The following example displays debug output from the debug ccsip dhcp command:
Router# debug ccsip dhcpNov 18 17:20:48.881: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_register_configured_dest_patterns:No destination patterns to RegisterNov 18 17:20:48.881: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_spi_register_free_rcb: Freeing rcbNov 18 17:20:48.881: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_register_reset_dns_cache:CCSIP_REGISTER:: Primary registrar DNS resolved addr resetNov 18 17:21:00.965: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/config_credential_trigger_reg: QueryDHCP for provisioned info upon credential dhcp configNov 18 17:21:00.965: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/sipua_query_dhcp_reg_info: DHCPprovisioned option 125 availableNov 18 17:21:00.965: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_opt125: parsingdata in option 125 of length 73Nov 18 17:21:00.965: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_opt125: enterpriseID 210Nov 18 17:21:00.965: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_opt125: total optiondata length 80Nov 18 17:21:00.965: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_opt125: sub-optiontype 201 of length 6Nov 18 17:21:00.965: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_subopt_macaddr: MACaddr 1234567890ABNov 18 17:21:00.969:Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_opt125: sub-optiontype 202 of length 6Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_subopt_contract_num:pilot # 777777Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_opt125: sub-optiontype 203 of length 6Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_subopt_addn_num:secondary # 222222 (index 0)
Cisco IOS Debug Command Reference - Commands A through D 285
debug backhaul-session-manager session through debug channel packetsdebug ccsip dhcp
Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_opt125: sub-optiontype 203 of length 6Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_subopt_addn_num:secondary # 333333 (index 1)Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_opt125: sub-optiontype 203 of length 6Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_subopt_addn_num:secondary # 444444 (index 2)Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_opt125: sub-optiontype 203 of length 6Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_subopt_addn_num:secondary # 555555 (index 3)Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_opt125: sub-optiontype 203 of length 6Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_subopt_addn_num:secondary # 666666 (index 4)Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_opt125: sub-optiontype 204 of length 14Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_subopt_domain:domain sublen 5Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_subopt_domain:domain sublen 3Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_subopt_domain:domain dns:cisco.comNov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/ccsip_gw_parse_dhcp_opt125: parsing ofDHCP option 125 succeededNov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/SIP-DHCP/sipua_query_dhcp_reg_info: DHCPprovisioned SIP server addr: 9.13.2.36Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_register_cred_user: Sending msg type2 to register process from parser for user 777777Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_spi_register_process_e164_registration:CCSIP_REGISTER:: e164 number (777777)Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_register_search_e164_table: ****Noentry found in E164 TableNov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/Info/sipSPIAddContextToTable: Addedcontext(0x476FD758) with key=[1061] to tableNov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/Info/sipSPIGetOutboundHostAndDestHostPrivate:CCSIP: target_host : cisco.com target_port : 5060Nov 18 17:21:00.969: //-1/000000000000/SIP/Info/sipSPIValidateAndCopyOutboundHost: CCSIP:copy target_host to outbound_hostNov 18 17:21:00.969: //-1/000000000000/SIP/State/sipSPIChangeState: 0x476FD758 : Statechange from (STATE_NONE, SUBSTATE_NONE) to (STATE_IDLE, SUBSTATE_NONE)Nov 18 17:21:00.969: //-1/000000000000/SIP/Info/ccsip_spi_registrar_add_expires_header:Inside ccsip_spi_registrar_add_expires_header for ExpiresNov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/Event/sipSPIEventInfo: Queued event from SIP SPI: SIPSPI_EV_OUTBOUND_REGISTERNov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_register_add_to_e164_table: ****Addedto E164 TableNov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_process_sipspi_queue_event:ccsip_spi_get_msg_type returned: 3 for event 40Nov 18 17:21:00.969: //-1/000000000000/SIP/Info/act_idle_outgoing_register: Inact_idle_outgoing_registerNov 18 17:21:00.969: //1034/000000000000/SIP/Info/act_idle_outgoing_register: Send REGISTERto cisco.com:5060Nov 18 17:21:00.969: //1034/000000000000/SIP/Info/sipSPIUaddCcbToUACTable: ****Adding toUAC table.Nov 18 17:21:00.969: //1034/000000000000/SIP/Info/sipSPIUaddCcbToTable: Added to table.ccb=0x476FD758 key=1AF6E28A-B4CC11DD-81078B9C-6E99E02BNov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/Event/sipSPIEventInfo: Queued event from SIP SPI: SIPSPI_EV_DNS_RESOLVENov 18 17:21:00.969: //1034/000000000000/SIP/State/sipSPIChangeState: 0x476FD758 : Statechange from (STATE_IDLE, SUBSTATE_NONE) to (STATE_IDLE, SUBSTATE_SENT_DNS)Nov 18 17:21:00.969: //1034/000000000000/SIP/State/sipSPIChangeState: 0x476FD758 : Statechange from (STATE_IDLE, SUBSTATE_SENT_DNS) to (SIP_STATE_OUTGOING_REGISTER,SUBSTATE_SENT_DNS)Nov 18 17:21:00.969: //-1/xxxxxxxxxxxx/SIP/Info/sip_dns_type_srv_query: TYPE SRV query for_sip._udp.cisco.com and type:1Nov 18 17:21:00.977: //-1/xxxxxxxxxxxx/SIP/Info/sip_dns_type_a_aaaa_query: DNS query forcisco.com and type:1Nov 18 17:21:00.977: //-1/xxxxxxxxxxxx/SIP/Info/sip_dns_type_a_query: TYPE A query successfulfor cisco.comNov 18 17:21:00.977: //-1/xxxxxxxxxxxx/SIP/Info/sip_dns_type_a_aaaa_query: IP Address ofcisco.com is:
Cisco IOS Debug Command Reference - Commands A through D286
debug backhaul-session-manager session through debug channel packetsdebug ccsip dhcp
Nov 18 17:21:00.977: //-1/xxxxxxxxxxxx/SIP/Info/sip_dns_type_a_aaaa_query: 9.13.2.36Nov 18 17:21:00.977: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_process_sipspi_queue_event:ccsip_spi_get_msg_type returned: 2 for event 43Nov 18 17:21:00.977: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_register_set_dns_resolved_address:CCSIP_REGISTER:: Primary registrar DNS resolved addr set to 0.0.0.1:151847460Nov 18 17:21:00.977: //-1/xxxxxxxxxxxx/SIP/Info/ccsipRegisterStartExpiresTimer: Startingtimer for pattern for 3600 secondsNov 18 17:21:00.977: //1034/000000000000/SIP/State/sipSPIChangeState: 0x476FD758 : Statechange from (SIP_STATE_OUTGOING_REGISTER, SUBSTATE_SENT_DNS) to (SIP_STATE_OUTGOING_REGISTER,SUBSTATE_NONE)Nov 18 17:21:00.977: //-1/xxxxxxxxxxxx/SIP/Info/sipSPISetDateHeader: Clock Time Zone isUTC, same as GMT: Using GMTNov 18 17:21:00.981: //1034/000000000000/SIP/Info/sipSPISendRegister: Associatedcontainer=0x46794ACC to RegisterNov 18 17:21:00.981: //1034/000000000000/SIP/Transport/sipSPISendRegister: Sending REGISTERto the transport layerNov 18 17:21:00.981: //1034/000000000000/SIP/Transport/sipSPIGetSwitchTransportFlag: Returnthe Dial peer configuration, Switch Transport is FALSENov 18 17:21:00.981: //1034/000000000000/SIP/Transport/sipSPITransportSendMessage:msg=0x4707F998, addr=9.13.2.36, port=5060, sentBy_port=0, is_req=1, transport=1, switch=0,callBack=0x415A53B0Nov 18 17:21:00.981: //1034/000000000000/SIP/Transport/sipSPITransportSendMessage: Proceedablefor sending msg immediatelyNov 18 17:21:00.981: //1034/000000000000/SIP/Transport/sipTransportLogicSendMsg: switchtransport is 0Nov 18 17:21:00.981: //1034/000000000000/SIP/Transport/sipTransportLogicSendMsg: Set tosend the msg=0x4707F998Nov 18 17:21:00.981: //-1/xxxxxxxxxxxx/SIP/Transport/sipTransportPostSendMessage: Postingsend for msg=0x4707F998, addr=9.13.2.36, port=5060, connId=2 for UDPNov 18 17:21:00.981: //1034/000000000000/SIP/State/sipSPIChangeState: 0x476FD758 : Statechange from (SIP_STATE_OUTGOING_REGISTER, SUBSTATE_NONE) to (SIP_STATE_OUTGOING_REGISTER,SUBSTATE_NONE)Nov 18 17:21:00.981: //-1/xxxxxxxxxxxx/SIP/Msg/ccsipDisplayMsg:Sent:REGISTER sip:cisco.com:5060 SIP/2.0Date: Tue, 18 Nov 2008 17:21:00 GMTFrom: <sip:[email protected]>;tag=34FBAED8-131Supported: pathTimestamp: 1227028860Content-Length: 0User-Agent: Cisco-SIPGateway/IOS-12.xTo: <sip:[email protected]>Contact: <sip:[email protected]:5060>Expires: 3600Call-ID: 1AF6E28A-B4CC11DD-81078B9C-6E99E02BVia: SIP/2.0/UDP 9.13.8.183:5060;branch=z9hG4bK3F522D9CSeq: 2 REGISTERMax-Forwards: 70Nov 18 17:21:00.981: //-1/xxxxxxxxxxxx/SIP/Info/HandleUdpIPv4SocketReads: Msg enqueued forSPI with IP addr: [9.13.2.36]:56305Nov 18 17:21:00.981: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_process_sipspi_queue_event:ccsip_spi_get_msg_type returned: 2 for event 1Nov 18 17:21:00.981: //-1/xxxxxxxxxxxx/SIP/Transport/sipTransportProcessNWNewConnMsg:context=0x00000000Nov 18 17:21:00.985: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_new_msg_preprocessor: Checking InviteDialogNov 18 17:21:00.985: //-1/xxxxxxxxxxxx/SIP/Msg/ccsipDisplayMsg:Received:SIP/2.0 100 TryingVia: SIP/2.0/UDP 9.13.8.183:5060;received=9.13.8.183;branch=z9hG4bK3F522D9Call-ID: 1AF6E28A-B4CC11DD-81078B9C-6E99E02BFrom: <sip:[email protected]>;tag=34FBAED8-131To: <sip:[email protected]>CSeq: 2 REGISTERContent-Length: 0Nov 18 17:21:01.077: //-1/xxxxxxxxxxxx/SIP/Info/HandleUdpIPv4SocketReads: Msg enqueued forSPI with IP addr: [9.13.2.36]:56306Nov 18 17:21:01.077: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_process_sipspi_queue_event:ccsip_spi_get_msg_type returned: 2 for event 1Nov 18 17:21:01.077: //-1/xxxxxxxxxxxx/SIP/Transport/sipTransportProcessNWNewConnMsg:context=0x00000000Nov 18 17:21:01.077: //-1/xxxxxxxxxxxx/SIP/Info/ccsip_new_msg_preprocessor: Checking InviteDialog
Cisco IOS Debug Command Reference - Commands A through D 287
debug backhaul-session-manager session through debug channel packetsdebug ccsip dhcp
Nov 18 17:21:01.077: //-1/xxxxxxxxxxxx/SIP/Msg/ccsipDisplayMsg:Received:SIP/2.0 200 OKVia: SIP/2.0/UDP 9.13.8.183:5060;received=9.13.8.183;branch=z9hG4bK3F522D9Call-ID: 1AF6E28A-B4CC11DD-81078B9C-6E99E02BFrom: <sip:[email protected]>;tag=34FBAED8-131To: <sip:[email protected]>CSeq: 2 REGISTERContact: <sip:[email protected]:5060>;expires=3600Content-Length: 0Nov 18 17:21:01.077: //1034/000000000000/SIP/Info/ccsip_gw_register_process_response: NoP-Assoicated-URI present in Register ResponseNov 18 17:21:01.077: //-1/xxxxxxxxxxxx/SIP/Info/ccsipRegisterStartExpiresTimer: Startingtimer for pattern 777777 for 2880 secondsNov 18 17:21:01.077: //-1/xxxxxxxxxxxx/SIP/Info/sipSPIDeleteContextFromTable: Context forkey=[1061] removed.Nov 18 17:21:01.077: //1034/000000000000/SIP/Info/sipSPIUdeleteCcbFromUACTable: ****Deletingfrom UAC table.Nov 18 17:21:01.077: //1034/000000000000/SIP/Info/sipSPIUdeleteCcbFromTable: Deleting fromtable. ccb=0x476FD758 key=1AF6E28A-B4CC11DD-81078B9C-6E99E02BNov 18 17:21:01.077: //1034/000000000000/SIP/Info/sipSPIFlushEventBufferQueue: There are 0events on the internal queue that are going to be free'dNov 18 17:21:01.077: //1034/000000000000/SIP/Info/ccsip_qos_cleanup: EntryNov 18 17:21:01.077: //1034/000000000000/SIP/Info/sipSPI_ipip_free_codec_profile: CodecProfiles FreedNov 18 17:21:01.077: //1034/000000000000/SIP/Info/sipSPIUfreeOneCCB: Freeing ccb 476FD758Nov 18 17:21:01.081: //-1/xxxxxxxxxxxx/SIP/Info/sipSPIGetContextFromTable: NO context forkey[1061]Nov 18 17:21:02.761: %SYS-5-CONFIG_I: Configured from console by consoleCUBE-DHCP-CLIENT1#
Related Commands DescriptionCommand
Enables all SIP-related debuggingdebug ccsip all
Displays all SIP SPI call tracing.debug ccsip calls
Displays SIP SPI errors.debug ccsip error
Displays all SIP SPI events tracing.debug ccsip events
Displays all SIP SPI message tracing.debug ccsip in
Displays all SIP SPI state tracing.debug ccsip states
Cisco IOS Debug Command Reference - Commands A through D288
debug backhaul-session-manager session through debug channel packetsdebug ccsip dhcp
debug ccsip errorTo show Session Initiation Protocol (SIP) Service Provider Interface (SPI) errors, use the debugccsiperrorcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ccsip error
no debug ccip error
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History This command was introduced.12.1(1)T
Support was added for the Cisco AS5350 and Cisco AS5400 universal gateways.12.2(2)XA
This command was implemented on the Cisco AS5850 universal gateway.12.2(2)XB1
This commandwas integrated into Cisco IOS Release 12.2(8)T and implementedon Cisco 7200 series routers.
12.2(8)T
This command was integrated into Cisco IOS Release 12.2(11)T. Support forthe Cisco AS5300 universal access server, Cisco AS5350, Cisco AS5400, andCisco AS5850 universal gateway is not included in this release.
12.2(11)T
Usage Guidelines This command traces all error messages generated from errors encountered by the SIP subsystem.
Examples The following example displays debug output from one side of the call:
Router1#debug ccsip errorSIP Call error tracing is enabledRouter1#*Mar 6 14:16:41: CCSIP-SPI-CONTROL: act_idle_call_setup*Mar 6 14:16:41: act_idle_call_setup:Not using Voice Class Codec*Mar 6 14:16:41: act_idle_call_setup: preferred_codec set[0] type :g711ulaw bytes: 160*Mar 6 14:16:41: REQUEST CONNECTION TO IP:166.34.245.231 PORT:5060*Mar 6 14:16:41: CCSIP-SPI-CONTROL: act_idle_connection_created*Mar 6 14:16:41: CCSIP-SPI-CONTROL: act_idle_connection_created: Connid(1) created to166.34.245.231:5060, local_port 55674*Mar 6 14:16:41: sipSPIAddLocalContact*Mar 6 14:16:41: CCSIP-SPI-CONTROL: sip_stats_method*Mar 6 14:16:41: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.231:5060*Mar 6 14:16:41: CCSIP-SPI-CONTROL: act_sentinvite_new_message
Cisco IOS Debug Command Reference - Commands A through D 289
debug backhaul-session-manager session through debug channel packetsdebug ccsip error
*Mar 6 14:16:41: CCSIP-SPI-CONTROL: sipSPICheckResponse*Mar 6 14:16:41: CCSIP-SPI-CONTROL: sip_stats_status_code*Mar 6 14:16:41: Roundtrip delay 4 milliseconds for method INVITE*Mar 6 14:16:41: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.231:5060*Mar 6 14:16:41: CCSIP-SPI-CONTROL: act_recdproc_new_message*Mar 6 14:16:41: CCSIP-SPI-CONTROL: sipSPICheckResponse*Mar 6 14:16:41: CCSIP-SPI-CONTROL: sipSPICheckResponse : Updating session description*Mar 6 14:16:41: CCSIP-SPI-CONTROL: sip_stats_status_code*Mar 6 14:16:41: Roundtrip delay 8 milliseconds for method INVITE*Mar 6 14:16:41: HandleSIP1xxRinging: SDP MediaTypes negotiation successful!Negotiated Codec : g711ulaw , bytes :160Inband Alerting : 0*Mar 6 14:16:45: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.231:5060*Mar 6 14:16:45: CCSIP-SPI-CONTROL: act_recdproc_new_message*Mar 6 14:16:45: CCSIP-SPI-CONTROL: sipSPICheckResponse*Mar 6 14:16:45: CCSIP-SPI-CONTROL: sipSPICheckResponse : Updating session description*Mar 6 14:16:45: CCSIP-SPI-CONTROL: sip_stats_status_code*Mar 6 14:16:45: Roundtrip delay 3844 milliseconds for method INVITE*Mar 6 14:16:45: CCSIP-SPI-CONTROL: act_recdproc_new_message: SDP MediaTypes negotiationsuccessful!Negotiated Codec : g711ulaw , bytes :160*Mar 6 14:16:45: CCSIP-SPI-CONTROL: sipSPIReconnectConnection*Mar 6 14:16:45: CCSIP-SPI-CONTROL: recv_200_OK_for_invite*Mar 6 14:16:45: CCSIP-SPI-CONTROL: sip_stats_method*Mar 6 14:16:45: HandleUdpReconnection: Udp socket connected for fd: 1 with166.34.245.231:5060*Mar 6 14:16:45: CCSIP-SPI-CONTROL: ccsip_caps_ind*Mar 6 14:16:45: ccsip_caps_ind: Load DSP with codec (5) g711ulaw, Bytes=160*Mar 6 14:16:45: ccsip_caps_ind: set DSP for dtmf-relay = CC_CAP_DTMF_RELAY_INBAND_VOICE*Mar 6 14:16:45: CCSIP-SPI-CONTROL: ccsip_caps_ack*Mar 6 14:16:49: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.231:56101*Mar 6 14:16:49: CCSIP-SPI-CONTROL: act_active_new_message*Mar 6 14:16:49: CCSIP-SPI-CONTROL: sact_active_new_message_request*Mar 6 14:16:49: CCSIP-SPI-CONTROL: sip_stats_method*Mar 6 14:16:49: CCSIP-SPI-CONTROL: sip_stats_status_code*Mar 6 14:16:49: CCSIP-SPI-CONTROL: sipSPIInitiateCallDisconnect : Initiate calldisconnect(16) for outgoing call*Mar 6 14:16:49: CCSIP-SPI-CONTROL: act_disconnecting_disconnect*Mar 6 14:16:49: CCSIP-SPI-CONTROL: sipSPICallCleanup*Mar 6 14:16:49: CLOSE CONNECTION TO CONNID:1*Mar 6 14:16:49: sipSPIIcpifUpdate :CallState: 4 Playout: 2945 DiscTime:48340988 ConnTime48340525*Mar 6 14:16:49: udpsock_close_connect: Socket fd: 1 closed for connid 1 with remote port:5060The following example displays debug output from the other side of the call:
Router2# debug ccsip errorSIP Call error tracing is enabledRouter2#*Mar 8 17:42:39: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.230:55674*Mar 8 17:42:39: CCSIP-SPI-CONTROL: sipSPISipIncomingCall*Mar 8 17:42:39: CCSIP-SPI-CONTROL: act_idle_new_message*Mar 8 17:42:39: CCSIP-SPI-CONTROL: sact_idle_new_message_invite*Mar 8 17:42:39: CCSIP-SPI-CONTROL: sip_stats_method*Mar 8 17:42:39: sact_idle_new_message_invite:Not Using Voice Class Codec*Mar 8 17:42:39: sact_idle_new_message_invite: Preferred codec[0] type: g711ulaw Bytes:160*Mar 8 17:42:39: sact_idle_new_message_invite: Media Negotiation successful for anincoming call*Mar 8 17:42:39: sact_idle_new_message_invite: Negotiated Codec : g711ulaw, bytes:160Preferred Codec : g711ulaw, bytes :160*Mar 8 17:42:39: CCSIP-SPI-CONTROL: sip_stats_status_code*Mar 8 17:42:39: Num of Contact Locations 1 3660110 166.34.245.230 5060*Mar 8 17:42:39: CCSIP-SPI-CONTROL: act_recdinvite_proceeding*Mar 8 17:42:39: CCSIP-SPI-CONTROL: ccsip_caps_ind*Mar 8 17:42:39: ccsip_caps_ind: codec(negotiated) = 5(Bytes 160)*Mar 8 17:42:39: ccsip_caps_ind: Load DSP with codec (5) g711ulaw, Bytes=160*Mar 8 17:42:39: ccsip_caps_ind: set DSP for dtmf-relay = CC_CAP_DTMF_RELAY_INBAND_VOICE*Mar 8 17:42:39: CCSIP-SPI-CONTROL: ccsip_caps_ack*Mar 8 17:42:39: CCSIP-SPI-CONTROL: act_recdinvite_alerting*Mar 8 17:42:39: 180 Ringing with SDP - not likely
Cisco IOS Debug Command Reference - Commands A through D290
debug backhaul-session-manager session through debug channel packetsdebug ccsip error
*Mar 8 17:42:39: CCSIP-SPI-CONTROL: sip_stats_status_code*Mar 8 17:42:42: CCSIP-SPI-CONTROL: act_sentalert_connect*Mar 8 17:42:42: sipSPIAddLocalContact*Mar 8 17:42:42: CCSIP-SPI-CONTROL: sip_stats_status_code*Mar 8 17:42:42: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.230:55674*Mar 8 17:42:42: CCSIP-SPI-CONTROL: act_sentsucc_new_message*Mar 8 17:42:42: CCSIP-SPI-CONTROL: sip_stats_method*Mar 8 17:42:47: CCSIP-SPI-CONTROL: act_active_disconnect*Mar 8 17:42:47: REQUEST CONNECTION TO IP:166.34.245.230 PORT:5060*Mar 8 17:42:47: CCSIP-SPI-CONTROL: act_active_connection_created*Mar 8 17:42:47: CCSIP-SPI-CONTROL: sipSPICheckSocketConnection*Mar 8 17:42:47: CCSIP-SPI-CONTROL: sipSPICheckSocketConnection: Connid(1) created to166.34.245.230:5060, local_port 56101*Mar 8 17:42:47: CCSIP-SPI-CONTROL: sip_stats_method*Mar 8 17:42:47: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr: 166.34.245.230:55674*Mar 8 17:42:47: CCSIP-SPI-CONTROL: act_disconnecting_new_message*Mar 8 17:42:47: CCSIP-SPI-CONTROL: sact_disconnecting_new_message_response*Mar 8 17:42:47: CCSIP-SPI-CONTROL: sipSPICheckResponse*Mar 8 17:42:47: CCSIP-SPI-CONTROL: sip_stats_status_code*Mar 8 17:42:47: Roundtrip delay 0 milliseconds for method BYE*Mar 8 17:42:47: CCSIP-SPI-CONTROL: sipSPICallCleanup*Mar 8 17:42:47: CLOSE CONNECTION TO CONNID:1*Mar 8 17:42:47: sipSPIIcpifUpdate :CallState: 4 Playout: 1255 DiscTime:66856757 ConnTime66856294*Mar 8 17:42:47: udpsock_close_connect: Socket fd: 1 closed for connid 1 with remote port:5060
Related Commands DescriptionCommand
Enables all SIP-related debugging.debug ccsip all
Shows all SIP SPI call tracing.debug ccsip calls
Shows all SIP SPI events tracing.debug ccsip events
Shows all SIP SPI message tracing.debug ccsip info
Shows all SIP SPI state tracing.debug ccsip states
Cisco IOS Debug Command Reference - Commands A through D 291
debug backhaul-session-manager session through debug channel packetsdebug ccsip error
debug ccsip eventsTo enable tracing of events that are specific to service provider interface (SPI), use thedebugccsipeventscommand in privileged EXEC mode. To disable debugging output, use the no form of thiscommand.
debug ccsip events
no debug ccsip events
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History This command was introduced.12.1(1)T
Support was added for the Cisco AS5350 and Cisco AS5400 universal gateways.12.2(2)XA
This command was introduced on the Cisco AS5850 universal gateway.12.2(2)XB1
This command was integrated into Cisco IOS Release 12.2(11)T.12.2(11)T
Much of the information formerly found in the output of the debugccsipeventscommand is now reported in the output of the debugccsipinfo anddebugccsipmediacommands. The debugccsipeventscommand now displaysonly the debugging information specifically related to SIP events.
12.2(15)T
Usage Guidelines This command previously traced all events posted to Session Initiation Protocol (SIP) SPI from all interfacesand also provided general SIP SPI information. Beginning with Cisco IOS Release 12.2(15)T, thedebugccsipevents command displays only debugging information specifically related to SIP SPI events.Media stream and SIP SPI information is now reported in the debugccsipmediaand debugccsipinfo commandoutput.
This command is intended for use by Cisco technicians only.Note
Examples The following is sample output from the debugccsipeventscommand for a Cisco 3660:
Router# debug ccsip eventsSIP Call events tracing is enabled
Cisco IOS Debug Command Reference - Commands A through D292
debug backhaul-session-manager session through debug channel packetsdebug ccsip events
Router#Nov 15 18:20:25.779: Queued event from SIP SPI : SIPSPI_EV_CC_CALL_SETUPNov 15 18:20:25.779: Queued event from SIP SPI : SIPSPI_EV_CREATE_CONNECTIONNov 15 18:20:25.783: Queued event from SIP SPI : SIPSPI_EV_SEND_MESSAGENov 15 18:20:25.815: Queued event from SIP SPI : SIPSPI_EV_CREATE_CONNECTIONNov 15 18:20:25.819: Queued event from SIP SPI : SIPSPI_EV_SEND_MESSAGENov 15 18:20:28.339: Queued event from SIP SPI : SIPSPI_EV_CLOSE_CONNECTIONNov 15 18:20:28.339: Queued event from SIP SPI : SIPSPI_EV_SEND_MESSAGENov 15 18:20:50.844: Queued event from SIP SPI : SIPSPI_EV_CLOSE_CONNECTIONNov 15 18:20:50.844: Queued event from SIP SPI : SIPSPI_EV_SEND_MESSAGENov 15 18:20:50.848: Queued event from SIP SPI : SIPSPI_EV_CC_CALL_DISCONNECT
Related Commands DescriptionCommand
Enables all SIP-related debugging.debug ccsip all
Enables tracing of general SIP SPI information.debug ccsip info
Enables tracing of SIP call media streams.debug ccsip media
Cisco IOS Debug Command Reference - Commands A through D 293
debug backhaul-session-manager session through debug channel packetsdebug ccsip events
debug ccsip featureTo filter the DEBUG CCSIP INFO debugs based on various features, use the debug ccsip feature commandin privileged EXEC mode. To disable filtering of the INFO debugs, use the no form of this command.
debug ccsip feature feature-name1[ feature-name2 ] [ feature-name3 ] [ feature-name... ]
no debug ccsip
Syntax Description The feature for which you want to enable debuggingmessages. Youmust specifyat least one feature name from the available list.
feature-name
Command Default All features are selected.
Command Modes Privileged EXEC#
Command History ModificationRelease
This command was introduced.15.3(3)M
Usage Guidelines The table below shows the full list of features for which you can enable debugging messages. You can specifyany combination of these features, in any order you choose.
DescriptionFeature Name
Enables audio debugging.audio
Enables call admission control (CAC) debugging.cac
Enables configuration debugging.config
Enables control debugging.control
Enables Dual Tone Multi-Frequency (DTMF) debugging.dtmf
Enables fax debugging.fax
Enables SIP Cisco Call Manager Express line debugging.line
Enables miscellaneous feature debugging.misc-features
Enables misc (catch all) debugging.miscellaneous
Cisco IOS Debug Command Reference - Commands A through D294
debug backhaul-session-manager session through debug channel packetsdebug ccsip feature
DescriptionFeature Name
Enables parse debugging.parse
Enables SIP registration debugging.registration
Enables Session Description Protocol (SDP) negotiation debugging.sdp-negotiation
Enables SDP-passthrough debugging.sdp-passthrough
Enables SIP-profiles debugging.sip-profiles
Enables SIP transport debugging.sip-transport
Enables Secure Real-Time Transport Protocol (SRTP) debugging.srtp
Enables supplementary services debugging.supplementary-services
Enables transcoder debugging.transcoder
Enables video debugging.video
To activate feature debugging you must first enable CCSIP debugging using either the debug ccsip infoor debug ccsip all command.
Note
Examples The following example shows how to enable CCSIP feature debugging for audio, fax, DTMF, CAC and SIPregistration:Device# debug ccsip infoSIP Call info tracing is enabledDevice# debug ccsip feature audio cac dtmf fax registrationaudio debugging for ccsip info is enabled (active)fax debugging for ccsip info is enabled (active)dtmf debugging for ccsip info is enabled (active)cac debugging for ccsip info is enabled (active)registration debugging for ccsip info is enabled (active)
Cisco IOS Debug Command Reference - Commands A through D 295
debug backhaul-session-manager session through debug channel packetsdebug ccsip feature
debug ccsip infoTo enable tracing of general service provider interface (SPI) information, use the debugccsipinfocommandin privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ccsip info
no debug ccsip info
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(15)T
Usage Guidelines Beginning in Cisco IOS Release 12.2(15)T, the debugccsipinfocommand is a separate option that displaysgeneral SIP SPI information for debug purposes. In past releases, this output was part of thedebugccsipeventscommand.
This command is intended for use by Cisco technicians only.Note
Examples The following is sample output from the debugccsipinfocommand for a Cisco 3660:
Router# debug ccsip infoSIP Call info tracing is enabledRouter#Nov 15 18:19:22.670: ****Adding to UAC tableNov 15 18:19:22.670: adding call id E to tableNov 15 18:19:22.670: CCSIP-SPI-CONTROL: act_idle_call_setupNov 15 18:19:22.670: act_idle_call_setup:Not using Voice Class CodecNov 15 18:19:22.670: act_idle_call_setup: preferred_codec set[0] type :g729r8 bytes: 20Nov 15 18:19:22.670: sipSPICopyPeerDataToCCB: From CLI: Modem NSE payload = 100, Passthrough= 0,Modem relay = 0, Gw-Xid = 1SPRT latency 200, SPRT Retries = 12, Dict Size = 1024String Len = 32, Compress dir = 3Nov 15 18:19:22.670: ****Deleting from UAC tableNov 15 18:19:22.670: ****Adding to UAC tableNov 15 18:19:22.670: sipSPIUsetBillingProfile: sipCallId for billing records [email protected] 15 18:19:22.674: CCSIP-SPI-CONTROL: act_idle_connection_createdNov 15 18:19:22.674: CCSIP-SPI-CONTROL: act_idle_connection_created: Connid(1) created to172.18.193.190:5060, local_port 56981Nov 15 18:19:22.674: CCSIP-SPI-CONTROL: sipSPIOutgoingCallSDPNov 15 18:19:22.674: convert_codec_bytes_to_ptime: Values :Codec: g729r8 codecbytes :20,ptime: 10Nov 15 18:19:22.674: sip_generate_sdp_xcaps_list: Modem Relay disabled. X-cap not needed
Cisco IOS Debug Command Reference - Commands A through D296
debug backhaul-session-manager session through debug channel packetsdebug ccsip info
Nov 15 18:19:22.674: sipSPIAddLocalContactNov 15 18:19:22.674: sip_stats_methodNov 15 18:19:22.690: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr:172.18.193.190:5060Nov 15 18:19:22.690: CCSIP-SPI-CONTROL: act_sentinvite_new_messageNov 15 18:19:22.690: CCSIP-SPI-CONTROL: sipSPICheckResponseNov 15 18:19:22.690: sip_stats_status_codeNov 15 18:19:22.690: Roundtrip delay 16 milliseconds for method INVITENov 15 18:19:22.706: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr:172.18.193.190:5060Nov 15 18:19:22.706: CCSIP-SPI-CONTROL: act_recdproc_new_messageNov 15 18:19:22.706: CCSIP-SPI-CONTROL: sipSPICheckResponseNov 15 18:19:22.706: sip_stats_status_codeNov 15 18:19:22.706: Roundtrip delay 32 milliseconds for method INVITENov 15 18:19:22.706: sipSPIGetSdpBody : Parse incoming session descriptionNov 15 18:19:22.706: HandleSIP1xxSessionProgress: Content-Disposition received in 18xresponse:session;handling=requiredNov 15 18:19:22.706: sipSPIDoMediaNegotiation: number of m lines is 1Nov 15 18:19:22.706: sipSPIDoAudioNegotiation: Codec (g729r8) Negotiation Successful onStatic PayloadNov 15 18:19:22.706: sipSPIDoPtimeNegotiation: One ptime attribute found - value:10Nov 15 18:19:22.706: convert_ptime_to_codec_bytes: Values :Codec: g729r8 ptime :10,codecbytes: 20Nov 15 18:19:22.710: convert_codec_bytes_to_ptime: Values :Codec: g729r8 codecbytes :20,ptime: 10Nov 15 18:19:22.710: sipSPIDoDTMFRelayNegotiation: m-line index 1Nov 15 18:19:22.710: sipSPIDoDTMFRelayNegotiation: Requested DTMF-RELAY option(s) not foundin Preferred DTMF-RELAY option list!Nov 15 18:19:22.710: sip_sdp_get_modem_relay_cap_params:Nov 15 18:19:22.710: sip_sdp_get_modem_relay_cap_params: NSE payload from X-cap = 0Nov 15 18:19:22.710: sip_do_nse_negotiation: NSE Payload 100 found in SDPNov 15 18:19:22.710: sip_do_nse_negotiation: Remote NSE payload = local one = 100, Use itNov 15 18:19:22.710: sip_select_modem_relay_params: X-tmr not present in SDP. Disable modemrelayNov 15 18:19:22.710: sipSPIDoQoSNegotiation - SDP body with media descriptionNov 15 18:19:22.710: ccsip_process_response_contact_record_routeNov 15 18:19:22.710: CCSIP-SPI-CONTROL: ccsip_bridge: confID = 4, srcCallID = 14, dstCallID= 13Nov 15 18:19:22.710: sipSPIUupdateCcCallIds: old src/dest ccCallids: -1/-1, new src/destccCallids: 14/13Nov 15 18:19:22.710: sipSPIUupdateCcCallIds: old streamcallid=-1, new streamcallid=14Nov 15 18:19:22.710: CCSIP-SPI-CONTROL: ccsip_caps_indNov 15 18:19:22.710: ccsip_get_rtcp_session_parameters: CURRENT VALUES: stream_callid=14,current_seq_num=0x1B1BNov 15 18:19:22.710: ccsip_get_rtcp_session_parameters: NEW VALUES: stream_callid=14,current_seq_num=0x180CNov 15 18:19:22.710: ccsip_caps_ind: Load DSP with negotiated codec : g729r8, Bytes=20Nov 15 18:19:22.710: ccsip_caps_ind: set forking flag to 0x0Nov 15 18:19:22.710: sipSPISetDTMFRelayMode: set DSP for dtmf-relay =CC_CAP_DTMF_RELAY_INBAND_VOICE_AND_OOBNov 15 18:19:22.710: sip_set_modem_caps: Negotiation already Done. Set negotiated ModemcapsNov 15 18:19:22.710: sip_set_modem_caps: Modem Relay & Passthru both disabledNov 15 18:19:22.710: sip_set_modem_caps: nse payload = 100, ptru mode = 0, ptru-codec=0,redundancy=0, xid=0, relay=0, sprt-retry=12, latecncy=200, compres-dir=3, dict=1024,strnlen=32Nov 15 18:19:22.710: ccsip_caps_ind: Load DSP with codec : g729r8, Bytes=20Nov 15 18:19:22.710: CCSIP-SPI-CONTROL: ccsip_caps_ackNov 15 18:19:22.710: ccsip_caps_ack: set forking flag to 0x60FD1EACNov 15 18:19:22.710: CCSIP-SPI-CONTROL: act_recdproc_connection_createdNov 15 18:19:22.710: CCSIP-SPI-CONTROL: sipSPICheckSocketConnection: Connid(2) created to172.18.193.190:5060, local_port 51663Nov 15 18:19:22.714: sip_stats_methodNov 15 18:19:22.722: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr:172.18.193.190:5060Nov 15 18:19:22.722: CCSIP-SPI-CONTROL: act_recdproc_new_messageNov 15 18:19:22.722: CCSIP-SPI-CONTROL: sipSPICheckResponseNov 15 18:19:22.722: sip_stats_status_codeNov 15 18:19:22.722: Roundtrip delay 48 milliseconds for method PRACKNov 15 18:19:24.706: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr:172.18.193.190:5060Nov 15 18:19:24.706: CCSIP-SPI-CONTROL: act_recdproc_new_messageNov 15 18:19:24.706: CCSIP-SPI-CONTROL: sipSPICheckResponse
Cisco IOS Debug Command Reference - Commands A through D 297
debug backhaul-session-manager session through debug channel packetsdebug ccsip info
Nov 15 18:19:24.706: sip_stats_status_codeNov 15 18:19:24.706: Roundtrip delay 2032 milliseconds for method PRACKNov 15 18:19:24.706: sipSPIGetSdpBody : Parse incoming session descriptionNov 15 18:19:24.710: CCSIP-SPI-CONTROL: sipSPIUACSessionTimerNov 15 18:19:24.710: CCSIP-SPI-CONTROL: act_recdproc_continue_200_processingNov 15 18:19:24.710: CCSIP-SPI-CONTROL: act_recdproc_continue_200_processing: *** This ccbis the parentNov 15 18:19:24.710: sipSPICompareRespMediaInfoNov 15 18:19:24.710: sipSPIDoMediaNegotiation: number of m lines is 1Nov 15 18:19:24.710: sipSPIDoAudioNegotiation: Codec (g729r8) Negotiation Successful onStatic PayloadNov 15 18:19:24.710: sipSPIDoPtimeNegotiation: One ptime attribute found - value:10Nov 15 18:19:24.710: convert_ptime_to_codec_bytes: Values :Codec: g729r8 ptime :10,codecbytes: 20Nov 15 18:19:24.710: convert_codec_bytes_to_ptime: Values :Codec: g729r8 codecbytes :20,ptime: 10Nov 15 18:19:24.710: sipSPIDoDTMFRelayNegotiation: m-line index 1Nov 15 18:19:24.710: sipSPIDoDTMFRelayNegotiation: Requested DTMF-RELAY option(s) not foundin Preferred DTMF-RELAY option list!Nov 15 18:19:24.710: sip_sdp_get_modem_relay_cap_params:Nov 15 18:19:24.710: sip_sdp_get_modem_relay_cap_params: NSE payload from X-cap = 0Nov 15 18:19:24.710: sip_do_nse_negotiation: NSE Payload 100 found in SDPNov 15 18:19:24.710: sip_do_nse_negotiation: Remote NSE payload = local one = 100, Use itNov 15 18:19:24.710: sip_select_modem_relay_params: X-tmr not present in SDP. Disable modemrelayNov 15 18:19:24.710: sipSPIProcessMediaChangesNov 15 18:19:24.710: ccsip_process_response_contact_record_routeNov 15 18:19:24.710: CCSIP-SPI-CONTROL: sipSPIProcess200OKforinviteNov 15 18:19:24.710: sip_stats_methodNov 15 18:19:24.710: udpsock_close_connect: Socket fd: 1 closed for connid 1 with remoteport: 5060Nov 15 18:19:37.479: HandleUdpSocketReads :Msg enqueued for SPI with IPaddr:172.18.193.190:52180Nov 15 18:19:37.483: ****Found CCB in UAC tableNov 15 18:19:37.483: CCSIP-SPI-CONTROL: act_active_new_messageNov 15 18:19:37.483: CCSIP-SPI-CONTROL: sact_active_new_message_requestNov 15 18:19:37.483: sip_stats_methodNov 15 18:19:37.483: sip_stats_status_codeNov 15 18:19:37.483: CCSIP-SPI-CONTROL: sipSPIInitiateCallDisconnect : Initiate calldisconnect(16) for outgoing callNov 15 18:19:37.483: udpsock_close_connect: Socket fd: 2 closed for connid 2 with remoteport: 5060Nov 15 18:19:37.483: CCSIP-SPI-CONTROL: act_disconnecting_disconnectNov 15 18:19:37.483: CCSIP-SPI-CONTROL: sipSPICallCleanupNov 15 18:19:37.483: sipSPIIcpifUpdate :CallState: 4 Playout: 10230 DiscTime:1745148 ConnTime1743871Nov 15 18:19:37.483: ****Deleting from UAC tableNov 15 18:19:37.483: Removing call id ENov 15 18:19:37.483: freeing ccb 63330954
Related Commands DescriptionCommand
Enables all SIP-related debugging.debug ccsip all
Enables tracing of events that are specific to SIP SPI.debug ccsip events
Enables tracing of SIP call media streams.debug ccsip media
Cisco IOS Debug Command Reference - Commands A through D298
debug backhaul-session-manager session through debug channel packetsdebug ccsip info
debug ccsip levelTo enable filtering of the DEBUG CCSIP INFO messages based on importance, use the debug ccsip levelcommand in privileged EXECmode. To disable filtering of the INFO debugs, use the no form of this command.
debug ccsip level {critical| info| notify| verbose}
Syntax Description Enables critical level debugging(Severity 1).
critical
Enables information leveldebugging (Severity 3).
info
Enables notification leveldebugging (Severity 2).
notify
Enables verbose level debugging(Severity 4).
verbose
Command Default Verbose-level debugging is enabled.
Command Modes Privileged EXEC#
Command History ModificationRelease
This command was introduced.15.3(3)M
Usage Guidelines This command sets the level of debugging messages. Only one level of debug messages can be set.
When critical-level debugging is selected (Severity 1), messages are generated for specific errors such asresource failures. This information is used by the engineer to troubleshoot the system. When notify-leveldebugging is selected (Severity 2), messages include information on important milestones that were reachedand important processing steps that were met. When information-level debugging is selected, (Severity 3),messages contain all details needed to understand workflow. When verbose-level debugging is selected,(Severity 4), messages contain a high level of detail, which might not be useful when troubleshooting issues.
Examples The following example shows how to enable debugging messages for critical level events only:Device# debug ccsip level criticalcritical mode tracing for ccsip info is enabled (active)
Cisco IOS Debug Command Reference - Commands A through D 299
debug backhaul-session-manager session through debug channel packetsdebug ccsip level
debug ccsip mediaTo enable tracing of Session Initiation Protocol (SIP) call media streams, use the debugccsipmediacommandin privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ccsip media
no debug ccsip media
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(15)T
Usage Guidelines Beginning in Cisco IOS Release 12.2(15)T, the debugccsipmediacommand is a separate option that displaysdebugging information specific to SIP media stream processing. In past releases, this output was part of thedebugccsipeventscommand.
This command is intended for use by Cisco technicians only.Note
Examples The following is sample output from the debugccsipmediacommand for a Cisco 3660:
Router# debug ccsip media
SIP Call media tracing is enabledRouter#Nov 15 18:19:53.835: sipSPISetMediaSrcAddr: media src addr for stream 1 = 172.18.195.49Nov 15 18:19:53.835: sipSPIReserveRtpPort: reserved port 16500 for stream 1Nov 15 18:19:53.867: sipSPIReplaceSDPNov 15 18:19:53.871: sipSPICopySdpInfoNov 15 18:19:53.871: sipSPIUpdCallWithSdpInfo:Preferred Codec : g729r8, bytes :20Preferred DTMF relay : inband-voicePreferred NTE payload : 101Early Media : NoDelayed Media : NoBridge Done : NoNew Media : NoDSP DNLD Reqd : NoNov 15 18:19:53.871: sipSPISetMediaSrcAddr: media src addr for stream 1 = 172.18.195.49Nov 15 18:19:53.871: sipSPIUpdCallWithSdpInfo:M-line Index : 1State : STREAM_ADDING (3)Callid : -1Negotiated Codec : g729r8, bytes :20
Cisco IOS Debug Command Reference - Commands A through D300
debug backhaul-session-manager session through debug channel packetsdebug ccsip media
Negotiated DTMF relay : inband-voiceNegotiated NTE payload : 0Media Srce Addr/Port : 172.18.195.49:16500Media Dest Addr/Port : 172.18.193.190:19148Nov 15 18:19:53.871: sipSPIProcessRtpSessionsNov 15 18:19:53.871: sipSPIAddStream: Adding stream 1 (callid 16) to the VOIP RTP libraryNov 15 18:19:53.871: sipSPISetMediaSrcAddr: media src addr for stream 1 = 172.18.195.49Nov 15 18:19:53.871: sipSPIUpdateRtcpSession: for m-line 1Nov 15 18:19:53.871: sipSPIUpdateRtcpSession: rtcp_session infoladdr = 172.18.195.49, lport = 16500, raddr = 172.18.193.190, rport=19148Nov 15 18:19:53.871: sipSPIUpdateRtcpSession: No rtp session, creating a new oneNov 15 18:19:53.871: sipSPISetStreamInfo: num_streams = 1Nov 15 18:19:53.871: sipSPISetStreamInfo: adding stream type 0 from mline 1Nov 15 18:19:53.871: sipSPISetStreamInfo: caps.stream_count=1, caps.stream[0].stream_type=0x1,caps.stream_list.xmitFunc=voip_rtp_xmit, caps.stream_list.context=0x634F1F2C (gccb)Nov 15 18:19:55.555: sipSPICompareSDPNov 15 18:19:55.555: sipSPICompareStreams: stream 1 dest_port: old=19148 new=19148Nov 15 18:19:55.555: sipSPICompareStreams: Flags set for stream 1: RTP_CHANGE=NoCAPS_CHANGE=NoNov 15 18:19:55.555: sipSPICompareSDP: Flags set for call: NEW_MEDIA=No DSPDNLD_REQD=NoNov 15 18:19:55.555: sipSPIReplaceSDPNov 15 18:19:55.555: sipSPICopySdpInfoNov 15 18:19:55.555: sipSPIUpdCallWithSdpInfo:Preferred Codec : g729r8, bytes :20Preferred DTMF relay : inband-voicePreferred NTE payload : 101Early Media : NoDelayed Media : NoBridge Done : YesNew Media : NoDSP DNLD Reqd : NoNov 15 18:19:55.555: sipSPISetMediaSrcAddr: media src addr for stream 1 = 172.18.195.49Nov 15 18:19:55.555: sipSPIUpdCallWithSdpInfo:M-line Index : 1State : STREAM_ACTIVE (3)Callid : 16Negotiated Codec : g729r8, bytes :20Negotiated DTMF relay : inband-voiceNegotiated NTE payload : 0Media Srce Addr/Port : 172.18.195.49:16500Media Dest Addr/Port : 172.18.193.190:19148
Related Commands DescriptionCommand
Enables all SIP-related debugging.debug ccsip all
Enables tracing of events that are specific to SIP SPI.debug ccsip events
Enables tracing of general SIP SPI events.debug ccsip info
Cisco IOS Debug Command Reference - Commands A through D 301
debug backhaul-session-manager session through debug channel packetsdebug ccsip media
debug ccsip messagesTo show all Session Initiation Protocol (SIP) Service Provider Interface (SPI) message tracing, use thedebugccsipmessages command in privileged EXEC mode. To disable debugging output, use the no form ofthis command.
debug ccsip messages
no debug ccsip messages
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.1(1)T
The output of this command was changed.12.1.(3)T
Support was added for the Cisco AS5350 and Cisco AS5400 universalgateways.
12.2(2)XA
This command was implemented on the Cisco AS5850 universal gateway.12.2(2)XB1
This command was implemented on Cisco 7200 series routers.12.2(8)T
This command was integrated into Cisco IOS Release 12.2(11)T. Support forthe Cisco AS5300 universal access server, Cisco AS5350, Cisco AS5400, andCisco AS5850 universal gateway is not included in this release.
12.2(11)T
This command is supported in the Cisco IOS Release 12.2SX train. Supportin a specific 12.2SX release of this train depends on your feature set, platform,and platform hardware.
12.2SX
This command was integrated into Cisco IOS XE Release 2.5.IOS Release XE 2.5
Usage Guidelines This command traces the Session Initiation Protocol (SIP) messages exchanged between the SIP UA client(UAC) and the access server.
Cisco IOS Debug Command Reference - Commands A through D302
debug backhaul-session-manager session through debug channel packetsdebug ccsip messages
Examples The following example shows debug output from one side of the call:
Router1#debug ccsip messagesSIP Call messages tracing is enabledRouter1#*Mar 6 14:19:14: Sent:INVITE sip:[email protected];user=phone;phone-context=unknown SIP/2.0Via: SIP/2.0/UDP 166.34.245.230:55820From: "3660110" <sip:[email protected]>To: <sip:[email protected];user=phone;phone-context=unknown>Date: Sat, 06 Mar 1993 19:19:14 GMTCall-ID: [email protected]: 2881152943-2184249568-0-483551624User-Agent: Cisco VoIP Gateway/ IOS 12.x/ SIP enabledCSeq: 101 INVITEMax-Forwards: 6Timestamp: 731427554Contact: <sip:[email protected]:5060;user=phone>Expires: 180Content-Type: application/sdpContent-Length: 138v=0o=CiscoSystemsSIP-GW-UserAgent 5596 7982 IN IP4 166.34.245.230s=SIP Callt=0 0c=IN IP4 166.34.245.230m=audio 20762 RTP/AVP 0*Mar 6 14:19:14: Received:SIP/2.0 100 TryingVia: SIP/2.0/UDP 166.34.245.230:55820From: "3660110" <sip:[email protected]>To: <sip:[email protected];user=phone;phone-context=unknown>Date: Mon, 08 Mar 1993 22:45:12 GMTCall-ID: [email protected]: 731427554Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabledCSeq: 101 INVITEContent-Length: 0*Mar 6 14:19:14: Received:SIP/2.0 180 RingingVia: SIP/2.0/UDP 166.34.245.230:55820From: "3660110" <sip:[email protected]>To: <sip:[email protected];user=phone;phone-context=unknown>Date: Mon, 08 Mar 1993 22:45:12 GMTCall-ID: [email protected]: 731427554Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabledCSeq: 101 INVITEContent-Type: application/sdpContent-Length: 138v=0o=CiscoSystemsSIP-GW-UserAgent 1193 7927 IN IP4 166.34.245.231s=SIP Callt=0 0c=IN IP4 166.34.245.231m=audio 20224 RTP/AVP 0*Mar 6 14:19:16: Received:SIP/2.0 200 OKVia: SIP/2.0/UDP 166.34.245.230:55820From: "3660110" <sip:[email protected]>To: <sip:[email protected];user=phone;phone-context=unknown>;tag=27DBC6D8-1357Date: Mon, 08 Mar 1993 22:45:12 GMTCall-ID: [email protected]: 731427554Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabledContact: <sip:[email protected]:5060;user=phone>CSeq: 101 INVITEContent-Type: application/sdp
Cisco IOS Debug Command Reference - Commands A through D 303
debug backhaul-session-manager session through debug channel packetsdebug ccsip messages
Content-Length: 138v=0o=CiscoSystemsSIP-GW-UserAgent 1193 7927 IN IP4 166.34.245.231s=SIP Callt=0 0c=IN IP4 166.34.245.231m=audio 20224 RTP/AVP 0*Mar 6 14:19:16: Sent:ACK sip:[email protected]:5060;user=phone SIP/2.0Via: SIP/2.0/UDP 166.34.245.230:55820From: "3660110" <sip:[email protected]>To: <sip:[email protected];user=phone;phone-context=unknown>;tag=27DBC6D8-1357Date: Sat, 06 Mar 1993 19:19:14 GMTCall-ID: [email protected]: 6Content-Type: application/sdpContent-Length: 138CSeq: 101 ACKv=0o=CiscoSystemsSIP-GW-UserAgent 5596 7982 IN IP4 166.34.245.230s=SIP Callt=0 0c=IN IP4 166.34.245.230m=audio 20762 RTP/AVP 0*Mar 6 14:19:19: Received:BYE sip:[email protected]:5060;user=phone SIP/2.0Via: SIP/2.0/UDP 166.34.245.231:53600From: <sip:[email protected];user=phone;phone-context=unknown>;tag=27DBC6D8-1357To: "3660110" <sip:[email protected]>Date: Mon, 08 Mar 1993 22:45:14 GMTCall-ID: [email protected]: Cisco VoIP Gateway/ IOS 12.x/ SIP enabledMax-Forwards: 6Timestamp: 731612717CSeq: 101 BYEContent-Length: 0*Mar 6 14:19:19: Sent:SIP/2.0 200 OKVia: SIP/2.0/UDP 166.34.245.231:53600From: <sip:[email protected];user=phone;phone-context=unknown>;tag=27DBC6D8-1357To: "3660110" <sip:[email protected]>Date: Sat, 06 Mar 1993 19:19:19 GMTCall-ID: [email protected]: Cisco VoIP Gateway/ IOS 12.x/ SIP enabledTimestamp: 731612717Content-Length: 0CSeq: 101 BYEThe following example show debug output from the other side of the call:
Router2# debug ccsip messagesSIP Call messages tracing is enabledRouter2#*Mar 8 17:45:12: Received:INVITE sip:[email protected];user=phone;phone-context=unknown SIP/2.0Via: SIP/2.0/UDP 166.34.245.230:55820From: "3660110" <sip:[email protected]>To: <sip:[email protected];user=phone;phone-context=unknown>Date: Sat, 06 Mar 1993 19:19:14 GMTCall-ID: [email protected]: 2881152943-2184249568-0-483551624User-Agent: Cisco VoIP Gateway/ IOS 12.x/ SIP enabledCSeq: 101 INVITEMax-Forwards: 6Timestamp: 731427554Contact: <sip:[email protected]:5060;user=phone>Expires: 180Content-Type: application/sdpContent-Length: 138v=0o=CiscoSystemsSIP-GW-UserAgent 5596 7982 IN IP4 166.34.245.230s=SIP Callt=0 0
Cisco IOS Debug Command Reference - Commands A through D304
debug backhaul-session-manager session through debug channel packetsdebug ccsip messages
c=IN IP4 166.34.245.230m=audio 20762 RTP/AVP 0*Mar 8 17:45:12: Sent:SIP/2.0 100 TryingVia: SIP/2.0/UDP 166.34.245.230:55820From: "3660110" <sip:[email protected]>To: <sip:[email protected];user=phone;phone-context=unknown>Date: Mon, 08 Mar 1993 22:45:12 GMTCall-ID: [email protected]: 731427554Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabledCSeq: 101 INVITEContent-Length: 0*Mar 8 17:45:12: Sent:SIP/2.0 180 RingingVia: SIP/2.0/UDP 166.34.245.230:55820From: "3660110" <sip:[email protected]>To: <sip:[email protected];user=phone;phone-context=unknown>Date: Mon, 08 Mar 1993 22:45:12 GMTCall-ID: [email protected]: 731427554Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabledCSeq: 101 INVITEContent-Type: application/sdpContent-Length: 138v=0o=CiscoSystemsSIP-GW-UserAgent 1193 7927 IN IP4 166.34.245.231s=SIP Callt=0 0c=IN IP4 166.34.245.231m=audio 20224 RTP/AVP 0*Mar 8 17:45:14: Sent:SIP/2.0 200 OKVia: SIP/2.0/UDP 166.34.245.230:55820From: "3660110" <sip:[email protected]>To: <sip:[email protected];user=phone;phone-context=unknown>;tag=27DBC6D8-1357Date: Mon, 08 Mar 1993 22:45:12 GMTCall-ID: [email protected]: 731427554Server: Cisco VoIP Gateway/ IOS 12.x/ SIP enabledContact: <sip:[email protected]:5060;user=phone>CSeq: 101 INVITEContent-Type: application/sdpContent-Length: 138v=0o=CiscoSystemsSIP-GW-UserAgent 1193 7927 IN IP4 166.34.245.231s=SIP Callt=0 0c=IN IP4 166.34.245.231m=audio 20224 RTP/AVP 0*Mar 8 17:45:14: Received:ACK sip:[email protected]:5060;user=phone SIP/2.0Via: SIP/2.0/UDP 166.34.245.230:55820From: "3660110" <sip:[email protected]>To: <sip:[email protected];user=phone;phone-context=unknown>;tag=27DBC6D8-1357Date: Sat, 06 Mar 1993 19:19:14 GMTCall-ID: [email protected]: 6Content-Type: application/sdpContent-Length: 138CSeq: 101 ACKv=0o=CiscoSystemsSIP-GW-UserAgent 5596 7982 IN IP4 166.34.245.230s=SIP Callt=0 0c=IN IP4 166.34.245.230m=audio 20762 RTP/AVP 0*Mar 8 17:45:17: Sent:BYE sip:[email protected]:5060;user=phone SIP/2.0Via: SIP/2.0/UDP 166.34.245.231:53600From: <sip:[email protected];user=phone;phone-context=unknown>;tag=27DBC6D8-1357To: "3660110" <sip:[email protected]>Date: Mon, 08 Mar 1993 22:45:14 GMT
Cisco IOS Debug Command Reference - Commands A through D 305
debug backhaul-session-manager session through debug channel packetsdebug ccsip messages
Call-ID: [email protected]: Cisco VoIP Gateway/ IOS 12.x/ SIP enabledMax-Forwards: 6Timestamp: 731612717CSeq: 101 BYEContent-Length: 0*Mar 8 17:45:17: Received:SIP/2.0 200 OKVia: SIP/2.0/UDP 166.34.245.231:53600From: <sip:[email protected];user=phone;phone-context=unknown>;tag=27DBC6D8-1357To: "3660110" <sip:[email protected]>Date: Sat, 06 Mar 1993 19:19:19 GMTCall-ID: [email protected]: Cisco VoIP Gateway/ IOS 12.x/ SIP enabledTimestamp: 731612717Content-Length: 0CSeq: 101 BYE
Related Commands DescriptionCommand
Enables all SIP-related debugging.debug ccsip all
Shows all SIP SPI call tracing.debug ccsip calls
Shows SIP SPI errors.debug ccsip error
Shows all SIP SPI events tracing.debug ccsip events
Shows all SIP SPI state tracing.debug ccsip states
Cisco IOS Debug Command Reference - Commands A through D306
debug backhaul-session-manager session through debug channel packetsdebug ccsip messages
debug ccsip non-callTo enable non-call-context tracing, use the debug ccsip non-call command in privileged EXEC mode. Todisable debugging output, use the noform of this command or the undebug ccsip non-call command.
debug ccsip non-call
no debug ccsip non-call
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC (#)
Command History This command was introduced.15.4(2)T
This command was integrated into Cisco IOS XE Release 3.12S.Cisco IOS XE Release 3.12S
Usage Guidelines Use the debug ccsip non-call command to enable debugging of non-call-context trace messages (OPTIONS,REGISTER, SUBSCRIBE, and NOTIFY). Usually, SIP debugs contain unrelated debugs that are not usefulin debugging. This command will give you the control to enable or disable debugs without any call context;if a message is not part of any call, the debugs are not printed.
ExamplesDevice# debug ccsip non-callSIP Out-of-Dialog tracing is enabled
Related Commands DescriptionCommand
Shows all SIP SPI call tracing.debug ccsip calls
Shows SIP SPI errors.debug ccsip error
Shows all SIP SPI events tracing.debug ccsip events
Shows all SIP SPI message tracing.debug ccsip info
Shows all SIP SPI state tracing.debug ccsip states
Cisco IOS Debug Command Reference - Commands A through D 307
debug backhaul-session-manager session through debug channel packetsdebug ccsip non-call
debug ccsip preauthTo enable diagnostic reporting of authentication, authorization, and accounting (AAA) preauthentication forSession Initiation Protocol (SIP) calls, use the debugccsippreauth command in privileged EXEC mode. Todisable debugging output, use the no form of this command.
debug ccsip preauth
no debug ccsip preauth
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(11)T
Examples The following example shows debug output for a single SIP call:
Router# debug ccsip preauthSIP Call preauth tracing is enabledJan 23 18:43:17.898::Preauth RequiredJan 23 18:43:17.898: In sipSPISendPreauthReq for preauth_id = 86515, ccb = 67AF4E10Jan 23 18:43:17.898: Entering rpms_proc_print_preauth_reqJan 23 18:43:17.898: Request = 0Jan 23 18:43:17.898: Preauth id = 86515Jan 23 18:43:17.898: EndPt Type = 1Jan 23 18:43:17.898: EndPt = 192.168.80.70Jan 23 18:43:17.898: Resource Service = 1Jan 23 18:43:17.898: Call_origin = answerJan 23 18:43:17.898: Call_type = voipJan 23 18:43:17.898: Calling_num = 2270001Jan 23 18:43:17.898: Called_num = 1170001Jan 23 18:43:17.898: Protocol = 1Jan 23 18:43:17.898:sipSPISendPreauthReq:Created node with preauth_id = 86515, ccb 67AF4E10, node 6709C280Jan 23 18:43:17.898:rpms_proc_create_node:Created node with preauth_id = 86515Jan 23 18:43:17.898:rpms_proc_send_aaa_req:uid got is 466728Jan 23 18:43:17.902:rpms_proc_preauth_response:Context is for preauth_id 86515, aaa_uid466728Jan 23 18:43:17.902:rpms_proc_preauth_response:Deleting Tree node for preauth id 86515 uid466728Jan 23 18:43:17.902:sipSPIGetNodeForPreauth:Preauth_id=86515Jan 23 18:43:17.902: ccsip_spi_process_preauth_event:67AF4E10 ccb & 6709C280 nodeJan 23 18:43:17.902: In act_preauth_response:67AF4E10 ccbJan 23 18:43:17.902: act_preauth_response:Deleting node 6709C280 from treeThe table below describes the significant fields shown in the display.
Cisco IOS Debug Command Reference - Commands A through D308
debug backhaul-session-manager session through debug channel packetsdebug ccsip preauth
Table 51: debug ccsip preauth Field Descriptions
DescriptionField
Request Type--0 for preauthentication, 1 fordisconnect.
Request
Identifier for the preauthentication request.Preauth id
Call Origin End Point Type--1 for IP address, 2 forInterzone ClearToken (IZCT) value.
EndPt Type
Call Origin End Point Value--An IP address or IZCTvalue.
EndPt
Resource Service Type--1 for Reservation, 2 forQuery.
Resource Service
Answer.Call_origin
Voice over IP (VoIP).Call_type
Calling Party Number (CLID).Calling_num
Called Party Number (DNIS).Called_num
0 for H.323, 1 for SIP.Protocol
Various identifiers and status reports for executedfunctions.
function reports
Cisco IOS Debug Command Reference - Commands A through D 309
debug backhaul-session-manager session through debug channel packetsdebug ccsip preauth
debug ccsip statesTo show all Session Initiation Protocol (SIP) Service Provider Interface (SPI) state tracing, use thedebugccsipstates command in privileged EXEC mode. To disable debugging output, use the no form of thiscommand.
debug ccsip states
no debug ccsip states
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.1(1)T
Support was added for the Cisco AS5350 and Cisco AS5400 universal gateways.12.2(2)XA
This command was implemented on the Cisco AS5850 universal gateway.12.2(2)XB1
This command was implemented on Cisco 7200 series routers.12.2(8)T
This command was integrated into Cisco IOS Release 12.2(11)T. Support forthe Cisco AS5300 universal access server, Cisco AS5350, Cisco AS5400, andCisco AS5850 universal gateway is not included in this release.
12.2(11)T
This command is supported in the Cisco IOS Release 12.2SX train. Support ina specific 12.2SX release of this train depends on your feature set, platform, andplatform hardware.
12.2SX
Usage Guidelines This command traces the state machine changes of SIP SPI and displays the state transitions.
Examples The following example shows all SIP SPI state tracing:
Router1# debug ccsip statesSIP Call states tracing is enabledRouter1#*Jan 2 18:34:37.793:0x6220C634 :State change from (STATE_NONE, SUBSTATE_NONE) to (STATE_IDLE,SUBSTATE_NONE)*Jan 2 18:34:37.797:0x6220C634 :State change from (STATE_IDLE, SUBSTATE_NONE) to (STATE_IDLE,SUBSTATE_CONNECTING)
Cisco IOS Debug Command Reference - Commands A through D310
debug backhaul-session-manager session through debug channel packetsdebug ccsip states
*Jan 2 18:34:37.797:0x6220C634 :State change from (STATE_IDLE, SUBSTATE_CONNECTING) to(STATE_IDLE, SUBSTATE_CONNECTING)*Jan 2 18:34:37.801:0x6220C634 :State change from (STATE_IDLE, SUBSTATE_CONNECTING) to(STATE_SENT_INVITE, SUBSTATE_NONE)*Jan 2 18:34:37.809:0x6220C634 :State change from (STATE_SENT_INVITE, SUBSTATE_NONE) to(STATE_RECD_PROCEEDING, SUBSTATE_PROCEEDING_PROCEEDING)*Jan 2 18:34:37.853:0x6220C634 :State change from (STATE_RECD_PROCEEDING,SUBSTATE_PROCEEDING_PROCEEDING) to (STATE_RECD_PROCEEDING, SUBSTATE_PROCEEDING_ALERTING)*Jan 2 18:34:38.261:0x6220C634 :State change from (STATE_RECD_PROCEEDING,SUBSTATE_PROCEEDING_ALERTING) to (STATE_ACTIVE, SUBSTATE_NONE)*Jan 2 18:35:09.860:0x6220C634 :State change from (STATE_ACTIVE, SUBSTATE_NONE) to(STATE_DISCONNECTING, SUBSTATE_NONE)*Jan 2 18:35:09.868:0x6220C634 :State change from (STATE_DISCONNECTING, SUBSTATE_NONE) to(STATE_DEAD, SUBSTATE_NONE)*Jan 2 18:28:38.404: Queued event from SIP SPI :SIPSPI_EV_CLOSE_CONNECTION
Related Commands DescriptionCommand
Enables all SIP-related debugging.debug ccsip all
Shows all SIP SPI call tracing.debug ccsip calls
Shows SIP SPI errors.debug ccsip error
Shows all SIP SPI events tracing.debug ccsip events
Shows all SIP SPI message tracing.debug ccsip info
Cisco IOS Debug Command Reference - Commands A through D 311
debug backhaul-session-manager session through debug channel packetsdebug ccsip states
debug ccsip transportTo enable tracing of the Session Initiation Protocol (SIP) transport handler and the TCP or User DatagramProtocol (UDP) process, use the debugccsiptransportcommand in privileged EXEC mode. To disabledebugging output, use the no form of this command.
debug ccsip transport
no debug ccsip transport
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.3(8)T
This command is supported in the Cisco IOS Release 12.2SX train. Supportin a specific 12.2SX release of this train depends on your feature set, platform,and platform hardware.
12.2 SX
Usage Guidelines Use the debugccsiptransportcommand to debug issues related to connection and transport usage and to seethe flow of the messages being sent or received.
Examples The following is sample output from the debugccsiptransportcommand for a Cisco 3660:
Router# debug ccsip transport...1w1d: //18/8E16980D800A/SIP/Transport/sipSPISendInvite: Sending Invite to the transportlayer1w1d: //18/8E16980D800A/SIP/Transport/sipSPIGetSwitchTransportFlag: Return the Globalconfiguration, Switch Transport is TRUE1w1d: //18/8E16980D800A/SIP/Transport/sipSPITransportSendMessage: msg=0x64082D50,addr=172.18.194.183, port=5060, sentBy_port=0, is_req=1, transport=1, switch=1,callBack=0x614FAB581w1d: //18/8E16980D800A/SIP/Transport/sipSPITransportSendMessage: Proceedable for sendingmsg immediately1w1d: //18/8E16980D800A/SIP/Transport/sipTransportLogicSendMsg: switch transport is 11w1d: //-1/xxxxxxxxxxxx/SIP/Transport/sipTransportGetInterfaceMtuSize: MTU size for remoteaddress 172.18.194.183 is 5001w1d: //-1/xxxxxxxxxxxx/SIP/Transport/sipTransportVerifyMsgForMTUThreshold: Interface MTUSize 500, Msg Size 10961w1d: //18/8E16980D800A/SIP/Transport/sipTransportLogicSendMsg: Switching msg=0x64082D50transport UDP->TCP1w1d: //-1/xxxxxxxxxxxx/SIP/Transport/sipTransportSetAgeingTimer: Aging timer initiated forholder=0x64084058,addr=172.18.194.1831w1d: //-1/xxxxxxxxxxxx/SIP/Transport/sipCreateConnHolder: Created new holder=0x64084058,addr=172.18.194.183
Cisco IOS Debug Command Reference - Commands A through D312
debug backhaul-session-manager session through debug channel packetsdebug ccsip transport
1w1d: //-1/xxxxxxxxxxxx/SIP/Transport/sipTransportPostRequestConnection: Posting TCP conncreate request for addr=172.18.194.183, port=5060, context=0x64128D5C1w1d: //-1/xxxxxxxxxxxx/SIP/Transport/sipTransportSetConnWaitTimer: Wait timer set forconnection=0x64129BF4,addr=172.18.194.183, port=50601w1d: //-1/xxxxxxxxxxxx/SIP/Transport/sipCreateConnInstance: Created new initiatedconn=0x64129BF4, connid=-1, addr=172.18.194.183, port=5060, transport=tcp1w1d: //-1/xxxxxxxxxxxx/SIP/Transport/sipConnectionManagerProcessConnCreated:gConnTab=0x64128D5C, addr=172.18.194.183, port=5060, connid=1, transport=tcp1w1d: //-1/xxxxxxxxxxxx/SIP/Transport/sipInstanceHandleConnectionCreated: Movingconnection=0x64129BF4, connid=1state to pending1w1d: //-1/xxxxxxxxxxxx/SIP/Transport/sipTransportProcessNWConnectionCreated:context=0x64128D5C1w1d: //-1/xxxxxxxxxxxx/SIP/Transport/sipConnectionManagerProcessConnCreated:gConnTab=0x64128D5C, addr=172.18.194.183, port=5060, connid=1, transport=tcp1w1d: //-1/xxxxxxxxxxxx/SIP/Transport/sipTransportPostSendMessage: Posting send formsg=0x64082D50, addr=172.18.194.183, port=5060, connId=1 for TCP...The table below describes the significant fields shown in the display.
Table 52: debug ccsip transport Field Descriptions
DescriptionField
Indicates that the SIP signaling state machine hasinvoked transport layer operations such as transportarbitration logic and the connection managementinterface.
Sending Invite to the transport layer
Indicates that the gateway has been provisioned toenable the transport switching functionality based onthe message size. 1 is true and 0 is false.
switch transport is 1
Indicates that the bound outgoing Ethernet interfacethat sends the message to the given remote addressis configured for an MTU size of the indicated value.
MTU size for remote address
Indicates that the size of the message is larger thanthe size of the MTU; thus transport switching (fromUDP to TCP) should be enabled.
Interface MTU Size 500, Msg Size 1096
Indicates that transport switching from UDP to TCPis occurring for the handled message because of thelarge size of the message.
Switching msg=... transport UDP->TCP
Indicates that the connection algorithm is started; thatis, the counter begins to age out the TCP or UDPconnection if inactivity occurs.
Aging timer initiated for holder
Indicates a request for a TCP connection from a lowerTCP process.
Posting TCP conn create request
Cisco IOS Debug Command Reference - Commands A through D 313
debug backhaul-session-manager session through debug channel packetsdebug ccsip transport
DescriptionField
Indicates all the transport related attributes that theSIP signaling state machine originally gives to thetransport layer to send out the message. The attributesare:
• transport: 1 for UDP; 2 for TCP.
• switch (switching transport enabled or disabledfor large messages): 1 for enabled; 0 fordisabled.
sipSPITransportSendMessage:msg=0x64082D50,addr=...transport=1, switch=1, callBack=0x614FAB58
Indicates that all transport and connection relatedoperations are complete. The message is sent out onthe network targeted to the given address, port, andtransport.
Posting send for msg=0x64082D50, addr=...for TCP
Related Commands DescriptionCommand
Enables all SIP-related debugging.debug ccsip all
Enables tracing of general SIP SPI information.debug ccsip info
Enables switching between UDP and TCP transportmechanisms globally for large SIP messages.
transport switch
Enables switching between UDP and TCP transportmechanisms for large SIP messages for a specific dialpeer.
voice-class sip transport switch
Cisco IOS Debug Command Reference - Commands A through D314
debug backhaul-session-manager session through debug channel packetsdebug ccsip transport
debug ccswvoice vo-debugTo display detailed debugging information related to ccswvoice function calls during call setup and teardown,use the debugccswvoicevo-debug command in privileged EXEC mode. To disable debugging output, usethe no form of this command.
debug ccswvoice vo-debug
no debug ccswvoice vo-debug
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced on the Cisco MC3810 networking device.11.3(1)MA
This command was implemented on the Cisco 3600 series router.12.0(7)XK
This command was integrated into Cisco IOS Release 12.1(2)T.12.1(2)T
Usage Guidelines Use this command when attempting to troubleshoot a Vo call that uses the "cisco-switched" session protocol.This command provides the same information as the debugccswvoicevo-session command, but includesadditional debugging information relating to the calls.
Examples The following shows sample output from the debugccswvoicevo-debug command:
Router# debug ccswvoice vo-debug2w2d: ccswvoice: callID 529927 pvcid -1 cid -1 state NULL event O/G SETUP2w2d: ccswvoice_out_callinit_setup: callID 529927 using pvcid 1 cid 152w2d: ccswvoice: callID 529927 pvcid 1 cid 15 state O/G INIT event I/C PROC2w2d: ccswvoice: callID 529927 pvcid 1 cid 15 state O/G PROC event I/C ALERTccfrf11_caps_ind:codec(preferred) = 1
2w2d: ccswvoice: callID 529927 pvcid 1 cid 15 state O/G ALERT event I/C CONN2w2d: ccswvoice_bridge_drop: dropping bridge calls src 529927 dst 529926 pvcid 1 cid 15state ACTIVE2w2d: ccswvoice: callID 529927 pvcid 1 cid 15 state ACTIVE event O/G REL2w2d: ccswvoice: callID 529927 pvcid 1 cid 15 state RELEASE event I/C RELCOMP2w2d: ccswvo_store_call_history_entry: cause=10 tcause=10 cause_text=normal call clearing.
Related Commands DescriptionCommand
Displays the first 10 bytes (including header) ofselected VoFR subframes for the interface .
debug ccswvoice vo-session
Cisco IOS Debug Command Reference - Commands A through D 315
debug backhaul-session-manager session through debug channel packetsdebug ccswvoice vo-debug
Cisco IOS Debug Command Reference - Commands A through D316
debug backhaul-session-manager session through debug channel packetsdebug ccswvoice vo-debug
debug ccswvoice vofr-debugTo display the ccswvoice function calls during call setup and teardown, use the debugccswvoicevofr-debugcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ccswvoice vofr-debug
no debug ccswvoice vofr-debug
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced on the Cisco 2600 and Cisco 3600 seriesrouters.
12.0(3)XG
This command was integrated into Cisco IOS Release 12.0(4)T.12.0(4)T
This commandwas implemented on the CiscoMC3810 networking device.12.0(7)XK
This command was integrated into Cisco IOS Release 12.1(2)T.12.1(2)T
Usage Guidelines Use this command when troubleshooting a VoFR call that uses the "cisco-switched" session protocol. Thiscommand provides the same information as the debugccswvoicevofr-session command, but includes additionaldebugging information relating to the calls.
Examples The following shows sample output from the debugccswvoicevofr-debug command:
Router# debug ccswvoice vofr-debugCALL TEARDOWN:3640_vofr(config-voiceport)#*Mar 1 03:02:08.719:ccswvofr_bridge_drop:dropping bridge calls src 17 dst 16 dlci 100
cid 9 state ACTIVE*Mar 1 03:02:08.727:ccswvofr:callID 17 dlci 100 cid 9 state ACTIVE event O/G REL*Mar 1 03:02:08.735:ccswvofr:callID 17 dlci 100 cid 9 state RELEASE event I/C RELCOMP*Mar 1 03:02:08.735:ccswvofr_store_call_history_entry:cause=22 tcause=22
cause_text=no circuit.3640_vofr(config-voiceport)#CALL SETUP (outgoing):*Mar 1 03:03:22.651:ccswvofr:callID 23 dlci -1 cid -1 state NULL event O/G SETUP*Mar 1 03:03:22.651:ccswvofr_out_callinit_setup:callID 23 using dlci 100 cid 10*Mar 1 03:03:22.659:ccswvofr:callID 23 dlci 100 cid 10 state O/G INIT event I/C PROC*Mar 1 03:03:22.667:ccswvofr:callID 23 dlci 100 cid 10 state O/G PROC event I/C CONNccfrf11_caps_ind:codec(preferred) = 0
Cisco IOS Debug Command Reference - Commands A through D 317
debug backhaul-session-manager session through debug channel packetsdebug ccswvoice vofr-debug
Related Commands DescriptionCommand
Displays the ccfrf11 function calls during call setupand teardown.
debug cch323
Displays the ccswvoice function calls during callsetup and teardown.
debug ccsw voice vo-debug
Displays the first 10 bytes (including header) ofselected VoFR subframes for the interface.
debug vtsp session
Cisco IOS Debug Command Reference - Commands A through D318
debug backhaul-session-manager session through debug channel packetsdebug ccswvoice vofr-debug
debug ccswvoice vofr-sessionTo display the ccswvoice function calls during call setup and teardown, use the debugccswvoicevofr-sessioncommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug ccswvoice vofr-session
no debug ccswvoice vofr-session
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced on the Cisco 2600 and Cisco 3600 seriesrouters.
12.0(3)XG
This command was integrated into Cisco IOS Release 12.0(4)T.12.0(4)T
This commandwas implemented on the CiscoMC3810 networking device.12.0(7)XK
This command was integrated into Cisco IOS Release 12.1(2)T.12.1(2)T
Usage Guidelines Use this command to show the state transitions of the cisco-switched-vofr state machine as a call is processed,and when attempting to troubleshoot a VoFR call that uses the "cisco-switched" session protocol.
Examples The following shows sample output from the debugccswvoicevofr-session command:
Router# debug ccswvoice vofr-sessionCALL TEARDOWN:3640_vofr(config-voiceport)#*Mar 1 02:58:13.203:ccswvofr:callID 14 dlci 100 cid 8 state ACTIVE event O/G REL*Mar 1 02:58:13.215:ccswvofr:callID 14 dlci 100 cid 8 state RELEASE event I/C RELCOMP3640_vofr(config-voiceport)#CALL SETUP (outgoing):*Mar 1 02:59:46.551:ccswvofr:callID 17 dlci -1 cid -1 state NULL event O/G SETUP*Mar 1 02:59:46.559:ccswvofr:callID 17 dlci 100 cid 9 state O/G INIT event I/C PROC*Mar 1 02:59:46.567:ccswvofr:callID 17 dlci 100 cid 9 state O/G PROC event I/C CONN3640_vofr(config-voiceport)#
Related Commands DescriptionCommand
Displays the ccfrf11 function calls during call setupand teardown.
debug cch323
Cisco IOS Debug Command Reference - Commands A through D 319
debug backhaul-session-manager session through debug channel packetsdebug ccswvoice vofr-session
DescriptionCommand
Displays events that occur during RSVP setup.debug call rsvp-sync events
Displays the first 10 bytes (including header) ofselected VoFR subframes for the interface.
debug vtsp session
Cisco IOS Debug Command Reference - Commands A through D320
debug backhaul-session-manager session through debug channel packetsdebug ccswvoice vofr-session
debug ccswvoice vo-sessionTo display the first 10 bytes (including header) of selected VoFR subframes for the interface , use thedebugccswvoicevo-session command in privileged EXEC mode. To disable debugging output, use the noform of this command.
debug ccswvoice vo-session
no debug ccswvoice vo-session
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced on the Cisco MC3810 networking device.11.3(1)MA
This command was implemented on the Cisco 3600 series router.12.0(7)XK
This command was integrated into Cisco IOS Release 12.1(2)T.12.1(2)T
Usage Guidelines Use this command to show the state transitions of the cisco-switched-vo state machine as a call is processed.This command should be used when attempting to troubleshoot a Vo call that uses the "cisco-switched" sessionprotocol.
Examples The following shows sample output from the debugccswvoicevo-session command:
Router# debug ccswvoice vo-session2w2d: ccswvoice: callID 529919 pvcid -1 cid -1 state NULL event O/G SETUP2w2d: ccswvoice: callID 529919 pvcid 1 cid 11 state O/G INIT event I/C PROC2w2d: ccswvoice: callID 529919 pvcid 1 cid 11 state O/G PROC event I/C ALERT2w2d: ccswvoice: callID 529919 pvcid 1 cid 11 state O/G ALERT event I/C CONN2w2d: ccswvoice: callID 529919 pvcid 1 cid 11 state ACTIVE event O/G REL2w2d: ccswvoice: callID 529919 pvcid 1 cid 11 state RELEASE event I/C RELCOMP
Related Commands DescriptionCommand
Displays detailed debugging information related toccswvoice function calls during call setup andteardown.
debug ccswvoice vo-debug
Cisco IOS Debug Command Reference - Commands A through D 321
debug backhaul-session-manager session through debug channel packetsdebug ccswvoice vo-session
debug cdapiTo display information about the Call Distributor Application Programming Interface (CDAPI), use thedebugcdapicommand in privileged EXEC mode. To disable debugging output, use the no form of thiscommand.
debug cdapi {detail| events}
no debug cdapi {detail| events}
Syntax Description Displays when applications register or becomeunregistered with CDAPI, when calls are added ordeleted from the CDAPI routing table, and whenCDAPI messages are created and freed.
detail
Displays the events passing between CDAPI and anapplication or signalling stack.
events
Command Default Debugging output is disabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.0(6)T
This commandwas implemented on the Cisco AS5350 and Cisco AS5400.12.1(5)XM2
This command was integrated into Cisco IOS Release 12.3(2)T. Thiscommand was enhanced to show V.110 call types.
12.3(2)T
This command was enhanced to show V.120 call types.12.3(4)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines The detail keyword is useful for determining if messages are being lost (or not freed). It is also useful fordetermining the size of the raw messages passed between CDAPI and other applications to ensure that thecorrect number of bytes is being passed.
The events keyword is useful for determining if certain ISDNmessages are not being received by an applicationand if calls are not being directed to an application.
The following bandwidths are supported:
Cisco IOS Debug Command Reference - Commands A through D322
debug backhaul-session-manager session through debug channel packetsdebug cdapi
• 56 kbps
• 64 kbps
Examples The followingMedia Gateway Control Protocol (MGCP) packet received example shows V.110 call debuggingoutput for the debugcdapidetail command. In this example, the modem is not yet in STEADY_STATE.
Router# debug cdapi detailSep 26 19:12:25.327:MGCP Packet received from 10.0.44.109:2427-CRCX 6318 s7/ds1-0/24 MGCP 1.0C:111M:nas/dataL:b:64, nas/bt:v.110, nas/cdn:234567R:nas/au, nas/ax,nas/of, nas/crqX:101Sep 26 19:12:25.327:CDAPI:cdapi_create_msg():CDAPI Pool Count:959, Raw Length = 0Sep 26 19:12:25.327:CDAPI Se7/1:23:cdapi_add_entry_callRoutingTbl() -Sep 26 19:12:25.327: Added entry for call 0x7017 for application CSMSep 26 19:12:25.331:CDAPI:cdapi_create_msg():CDAPI Pool Count:958,router# Raw Length = 0Sep 26 19:12:25.331:CDAPI:cdapi_free_msg():Raw Length = 0, freeRaw = 1, Raw Msg = 0x0Sep 26 19:12:25.331:CDAPI:cdapi_free_msg():CDAPI Pool Count:959Sep 26 19:12:25.331:CDAPI:cdapi_free_msg():Raw Length = 0, freeRaw = 1, Raw Msg = 0x0Sep 26 19:12:25.331:CDAPI:cdapi_free_msg():CDAPI Pool Count:960Sep 26 19:12:25.331:send_mgcp_msg, MGCP Packet sent to 10.0.44.109:2427 --->Sep 26 19:12:25.331:200 6318 AlertI:64524608Sep 26 19:12:25.339:CDAPI:cdapi_crearouter#te_msg():CDAPI Pool Count:959, Raw Length = 0Sep 26 19:12:25.339:CDAPI:cdapi_free_msg():Raw Length = 0, freeRaw = 1, Raw Msg = 0x0Sep 26 19:12:25.339:CDAPI:cdapi_free_msg():CDAPI Pool Count:960router#Sep 26 19:12:33.223:MGCP Packet received from 10.0.44.109:2427-DLCX 6319 s7/ds1-0/24 MGCP 1.0Sep 26 19:12:33.223:CDAPI:cdapi_create_msg():CDAPI Pool Count:959, Raw Length = 0Sep 26 19:12:33.223:CDAPI:cdapi_create_msg():CDAPI Pool Count:958, Raw Length = 0Sep 26 19:12:33.223:CDAPI:cdapi_free_msg():Raw Length = 0, freeRaw = 1, Raw Msg = 0x0Sep 26 19:12:33.223:CDAPI:cdapi_free_msg():CDAPI Pool Count:959Sep 26 19:12:33.227:CDAPI:cdapi_create_msg():CDAPI Pool Count:958, Rawrouter# Length = 0Sep 26 19:12:33.227:CDAPI Se7/1:23:cdapi_del_entry_callRoutingTbl() -Sep 26 19:12:33.227: Deleted entry for call 0x7017Sep 26 19:12:33.227:CDAPI:cdapi_free_msg():Raw Length = 0, freeRaw = 1, Raw Msg = 0x0Sep 26 19:12:33.227:CDAPI:cdapi_free_msg():CDAPI Pool Count:959Sep 26 19:12:33.227:CDAPI:cdapi_free_msg():Raw Length = 0, freeRaw = 1, Raw Msg = 0x0Sep 26 19:12:33.227:CDAPI:cdapi_free_msg():CDAPI Pool Count:960Sep 26 19:12:33.227:send_mgcp_msg, MGCP Packet sentrouter#to 10.0.44.109:2427 --->Sep 26 19:12:33.227:200 6319 OK
The following partial example shows V.120 call debugging output for the debugcdapidetail command:
Router# debug cdapi detailMay 14 19:12:25.327:MGCP Packet received from 10.0.44.109:2427-CRCX 6318 s7/ds1-0/24 MGCP 1.0C:111M:nas/dataL:b:64, nas/bt:v.120, nas/cdn:234567R:nas/au, nas/ax,nas/of, nas/crqX:101May 14 19:12:25.327:CDAPI:cdapi_create_msg():CDAPI Pool Count:959, Raw Length = 0May 14 19:12:25.327:CDAPI Se7/1:23:cdapi_add_entry_callRoutingTbl() -May 14 19:12:25.327: Added entry for call 0x7017 for application CSMMay 14 19:12:25.331:CDAPI:cdapi_create_msg():CDAPI Pool Count:958,router# Raw Length = 0May 14 19:12:25.331:CDAPI:cdapi_free_msg():Raw Length = 0, freeRaw = 1, Raw Msg = 0x0May 14 19:12:25.331:CDAPI:cdapi_free_msg():CDAPI Pool Count:959May 14 19:12:25.331:CDAPI:cdapi_free_msg():Raw Length = 0, freeRaw = 1, Raw Msg = 0x0
Cisco IOS Debug Command Reference - Commands A through D 323
debug backhaul-session-manager session through debug channel packetsdebug cdapi
May 14 19:12:25.331:CDAPI:cdapi_free_msg():CDAPI Pool Count:960May 14 19:12:25.331:send_mgcp_msg, MGCP Packet sent to 10.0.44.109:2427 --->...The followingMGCP packet received example shows V.120 call debugging output for the debugcdapieventscommand:
Router# debug cdapi eventsSep 26 19:14:39.027:MGCP Packet received from 10.0.44.109:2427-CRCX 6322 s7/ds1-0/24 MGCP 1.0C:111M:nas/dataL:b:64, nas/bt:v.120, nas/cdn:234567R:nas/au, nas/ax,nas/of, nas/crqX:101Sep 26 19:14:39.027:Se7/0:23 CDAPI:TX -> CDAPI_MSG_CONNECT_IND to CSM call = 0x7017Sep 26 19:14:39.027: From Appl/Stack = XCSPSep 26 19:14:39.027: Call Type = V.120Sep 26 19:14:39.027: B Channel = 23Sep 26 19:14:39.027: dslId = 0Sep 26 19:14:39.027: Idb = 0Seprouter#26 19:14:39.027: BChanIdb = 64519A14Sep 26 19:14:39.027: Handle = 63CB8DF4Sep 26 19:14:39.027: RPA = 6388506CSep 26 19:14:39.027: Cause = 0Sep 26 19:14:39.027: ApplCause = 0Sep 26 19:14:39.027: ApplSpecData = 0Sep 26 19:14:39.027: Calling Party Number =Sep 26 19:14:39.027: Called Party Number = 234567Sep 26 19:14:39.027: Overlap = 0Sep 26 19:14:39.027:Se7/0:23 CDAPI:TX -> CDAPI_MSG_CONNECT_RESP to XCSP call = 0x7017Sep 26 19:14:39.027: From Applrouter#/Stack = CSMSep 26 19:14:39.027: Call Type = MODEMSep 26 19:14:39.027: B Channel = 23Sep 26 19:14:39.027: dslId = 0Sep 26 19:14:39.027: Idb = 0Sep 26 19:14:39.027: BChanIdb = 64519A14Sep 26 19:14:39.027: Handle = 63CB8DF4Sep 26 19:14:39.027: RPA = 0Sep 26 19:14:39.027: Cause = 0Sep 26 19:14:39.027: ApplCause = 0Sep 26 19:14:39.027: ApplSpecData = 0Sep 26 19:14:39.027: Overlap = 0Sep 26 19:14:39.031:send_mgcp_msg, MGCP Parouter#cket sent to 10.0.44.109:2427 --->Sep 26 19:14:39.031:200 6322 AlertI:64524608Sep 26 19:14:39.039:Se7/0:23 CDAPI:TX -> CDAPI_MSG_CONN_ACT_REQ to XCSP call = 0x7017Sep 26 19:14:39.039: From Appl/Stack = CSMSep 26 19:14:39.039: Call Type = MODEMSep 26 19:14:39.039: B Channel = 23Sep 26 19:14:39.039: dslId = 0Sep 26 19:14:39.039: Idb = 0Sep 26 19:14:39.039: BChanIdb = 64519A14Sep 26 19:14:39.039: Handle = 63CB8DF4Sep 26 19:14:39.039: Rrouter#PA = 0Sep 26 19:14:39.039: Cause = 0Sep 26 19:14:39.039: ApplCause = 0Sep 26 19:14:39.039: ApplSpecData = 0Sep 26 19:14:39.039: Overlap = 0router#Sep 26 19:14:48.959:MGCP Packet received from 10.0.44.109:2427-DLCX 6323 s7/ds1-0/24 MGCP 1.0Sep 26 19:14:48.963:Se7/0:23 CDAPI:TX -> CDAPI_MSG_DISCONNECT_IND to CSM call = 0x7017Sep 26 19:14:48.963: From Appl/Stack = XCSPSep 26 19:14:48.963: Call Type = V.120Sep 26 19:14:48.963: B Channel = 23
Cisco IOS Debug Command Reference - Commands A through D324
debug backhaul-session-manager session through debug channel packetsdebug cdapi
Sep 26 19:14:48.963: dslId = 0Sep 26 19:14:48.963: Idb = 0Sep 26 19:14:48.963: BChanIdb = 64519A14Sep 26 19:14:48.963: Handle = 63CB8DF4Sep 26 19:14router#:48.963: RPA = 6388506CSep 26 19:14:48.963: Cause = 0Sep 26 19:14:48.963: ApplCause = 0Sep 26 19:14:48.963: ApplSpecData = 0Sep 26 19:14:48.963: Overlap = 0Sep 26 19:14:48.963:Se7/0:23 CDAPI:TX -> CDAPI_MSG_SUBTYPE_RELEASE_REQ to XCSP call = 0x7017Sep 26 19:14:48.963: From Appl/Stack = CSMSep 26 19:14:48.963: Call Type = MODEMSep 26 19:14:48.963: B Channel = 23Sep 26 19:14:48.963: dslId = 0Sep 26 19:14:48.963: Idb = 0Sep 26 19:14:48router#.963: BChanIdb = 64519A14Sep 26 19:14:48.963: Handle = 63CB8DF4Sep 26 19:14:48.963: RPA = 0Sep 26 19:14:48.963: Cause = 0Sep 26 19:14:48.963: ApplCause = 1Sep 26 19:14:48.963: ApplSpecData = 0Sep 26 19:14:48.963: Overlap = 0Sep 26 19:14:48.963:Se7/0:23 CDAPI:TX -> CDAPI_MSG_SUBTYPE_REL_COMP_IND to CSM call = 0x7017Sep 26 19:14:48.963: From Appl/Stack = XCSPSep 26 19:14:48.963: Call Type = V.120Sep 26 19:14:48.963: B Channel = 23Sep 26 19:router#14:48.963: dslId = 0Sep 26 19:14:48.963: Idb = 0Sep 26 19:14:48.963: BChanIdb = 64519A14Sep 26 19:14:48.963: Handle = 63CB8DF4Sep 26 19:14:48.963: RPA = 6388506CSep 26 19:14:48.963: Cause = 0Sep 26 19:14:48.963: ApplCause = 0Sep 26 19:14:48.963: ApplSpecData = 0Sep 26 19:14:48.963: Overlap = 0Sep 26 19:14:48.963:send_mgcp_msg, MGCP Packet sent to 10.0.44.109:2427 --->Sep 26 19:14:48.963:200 6323 OKThe table below describes the significant fields shown in the displays.
Table 53: debug cdapi Field Descriptions
DescriptionField
The bearer type parameter includes v.110 and v.120for V.110 and V.120 calls.
L:b:64, nas/bt
Call types are V.110, V.120, and modem.Call Type
Related Commands DescriptionCommand
Displays the MGCP signaling message received andsent to the called agent.
debug mgcp packet
Displays the rawmessage owner, length, and pointer.debug voip rawmsg
Cisco IOS Debug Command Reference - Commands A through D 325
debug backhaul-session-manager session through debug channel packetsdebug cdapi
debug cdma pdsn a10 ahdlcTo display debug messages for Asynchronous High-Level Data Link Control (AHDLC), use thedebugcdmapdsna10ahdlccommand in privileged EXEC mode. To disable debugging output, use the noform of this command.
debug cdma pdsn a10 ahdlc [errors| events]
no debug cdma pdsn a10 ahdlc [errors| events]
Syntax Description (Optional) Displays details of AHDLC packets inerror.
errors
(Optional) Displays AHDLC events.events
Command Default If the command is entered without any optional keywords, all of the types of debug information are enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(2)XC
Keywords were made optional.12.2(8)BY
This command was integrated into Cisco IOS Release 12.3(4)T.12.3(4)T
Examples The following is sample output from the debugcdmapdsna10ahdlccommand:
Router# debug cdma pdsn a10 ahdlc errors
ahdlc error packet display debugging is onRouter# debug cdma pdsn a10 ahdlc eventsahdlc events display debugging is onRouter#*Jan 1 00:18:30:%LINK-3-UPDOWN:Interface Virtual-Access1, changed state to up*Jan 1 00:18:30:*****OPEN AHDLC******Jan 1 00:18:30: ahdlc_mgr_channel_create*Jan 1 00:18:30: ahdlc_mgr_allocate_available_channel:*Jan 1 00:18:30:ahdlc:tell h/w open channel 9 from engine 0
Cisco IOS Debug Command Reference - Commands A through D326
debug backhaul-session-manager session through debug channel packetsdebug cdma pdsn a10 ahdlc
debug cdma pdsn a10 greTo display debug messages for A10 Generic Routing Encapsulation (GRE) interface errors, events, andpackets, use the debugcdmapdsna10grecommand in privileged EXEC mode. To disable debugging output,use the no form of this command.
debug cdma pdsn a10 gre [errors| events| packets] [tunnel-key key]
no debug cdma pdsn a10 gre [errors| events| packets]
Syntax Description (Optional) Displays A10 GRE errors.errors
(Optional) Displays A10 GRE events.events
(Optional) Displays transmitted or receivedA10GREpackets.
packets
(Optional) Specifies the GRE key.tunnel-key key
Command Default If the command is entered without any optional keywords, all of the types of debug information are enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.1(3)XS
The tunnel-key keyword was added and the existing keywords weremade optional.
12.2(8)BY
This command was integrated into Cisco IOS Release 12.3(4)T.12.3(4)T
Examples The following is sample output from the debugcdmapdsna10greeventstunnel-keycommand:
Router# debug cdma pdsn a10 gre events tunnel-key 1
Router# show debugCDMA:CDMA PDSN A10 GRE events debugging is on for tunnel key 1
PDSN#*Mar 1 04:00:57.847:CDMA-GRE:CDMA-Ix1 (GRE/CDMA) created with src 5.0.0.2 dst 0.0.0.0*Mar 1 04:00:57.847:CDMA-GRE:(in) found session 5.0.0.2-4.0.0.1-1*Mar 1 04:00:59.863:CDMA-GRE:(in) found session 5.0.0.2-4.0.0.1-1*Mar 1 04:00:59.863:CDMA-GRE:(in) found session 5.0.0.2-4.0.0.1-1*Mar 1 04:01:01.879:CDMA-GRE:(in) found session 5.0.0.2-4.0.0.1-1
Cisco IOS Debug Command Reference - Commands A through D 327
debug backhaul-session-manager session through debug channel packetsdebug cdma pdsn a10 gre
*Mar 1 04:01:01.879:CDMA-GRE:(in) found session 5.0.0.2-4.0.0.1-1*Mar 1 04:01:03.899:CDMA-GRE:(in) found session 5.0.0.2-4.0.0.1-1*Mar 1 04:01:03.899:CDMA-GRE:(in) found session 5.0.0.2-4.0.0.1-1
Cisco IOS Debug Command Reference - Commands A through D328
debug backhaul-session-manager session through debug channel packetsdebug cdma pdsn a10 gre
debug cdma pdsn a10 pppTo display debug messages for A10 Point-to-Point protocol (PPP) interface errors, events, and packets, usethe debugcdmapdsna10pppcommand in privileged EXEC mode. To disable debugging output, use the noform of this command.
debug cdma pdsn a10 ppp [errors| events| packets]
no debug cdma pdsn a10 ppp [errors| events| packets]
Syntax Description (Optional) Displays A10 PPP errors.errors
(Optional) Displays A10 PPP events.events
(Optional) Displays transmitted or received A10 PPPpackets.
packets
Command Default If the command is entered without any optional keywords, all of the types of debug information are enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.1(3)XS
Keywords were made optional.12.2(8)BY
This command was integrated into Cisco IOS Release 12.3(4)T.12.3(4)T
Examples The following is sample output from the debugcdmapdsna10pppcommand:
Router# debug cdma pdsn a10 ppp errorsCDMA PDSN A10 errors debugging is onRouter# debug cdma pdsn a10 ppp events
CDMA PDSN A10 events debugging is onRouter# debug cdma pdsn a10 ppp packets
CDMA PDSN A10 packet debugging is onRouter# show debug
*Jan 1 00:13:09:CDMA-PPP:create_va tunnel=CDMA-Ix1 virtual-templatetemplate=Virtual-Template2 ip_enabled=1*Jan 1 00:13:09:CDMA-PPP:create_va va=Virtual-Access1*Jan 1 00:13:09:CDMA-PPP:clone va=Virtual-Access1 subif_state=1 hwidb->state=0*Jan 1 00:13:09: linestate=1 ppp_lineup=0
Cisco IOS Debug Command Reference - Commands A through D 329
debug backhaul-session-manager session through debug channel packetsdebug cdma pdsn a10 ppp
*Jan 1 00:13:09:%LINK-3-UPDOWN:Interface Virtual-Access1, changed state to up*Jan 1 00:13:09:CDMA-PPP:clone va=Virtual-Access1 subif_state=1 hwidb->state=4*Jan 1 00:13:09: linestate=0 ppp_lineup=0*Jan 1 00:13:09:*****OPEN AHDLC*****
Cisco IOS Debug Command Reference - Commands A through D330
debug backhaul-session-manager session through debug channel packetsdebug cdma pdsn a10 ppp
debug cdma pdsn a11To display debugmessages for A11 interface errors, events, and packets, use the debugcdmapdsna11commandin privileged EXEC mode. To disable debugging output, use the no form of this command.
debug cdma pdsn a11 [errors| events| packets] [ mnid ]
no debug cdma pdsn a11 [errors| events| packets]
Syntax Description (Optional) Displays A11 protocol errors.errors
(Optional) Displays A11 events.events
(Optional) Displays transmitted or received packets.packets
(Optional) Specifies the ID of the mobile station.mnid
Command Default If the command is entered without any optional keywords, all of the types of debug information are enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.1(3)XS
The mnid argument was added and the existing keywords were madeoptional.
12.2(8)BY
This command was integrated into Cisco IOS Release 12.3(4)T.12.3(4)T
Examples The following is sample output from the debugcdmapdsna11commands:
Router# debug cdma pdsn a11 errorsCDMA PDSN A11 errors debugging is onRouter# show debug1d21h:CDMA-RP:(in) rp_msgs, code=1, status=01d21h:CDMA-RP:(enqueue req) type=1 homeagent=5.0.0.2 coaddr=4.0.0.11d21h: id=0xBEF750F0-0xBA53E0F lifetime=655351d21h:CDMA-RP:len=8, 00-00-00-00-00-00-00-F1 convert to 00000000000001(14 digits), type=IMSI1d21h:CDMA-RP:(req) process_rp_req, homeagent=5.0.0.2 coaddr=4.0.0.11d21h: lifetime=65535 id=BEF750F0-BA53E0Fimsi=000000000000011d21h:CDMA-RP:(req) rp_req_create, 5.0.0.2-4.0.0.1-1 imsi=000000000000011d21h:CDMA-RP:(out) rp_reply session=5.0.0.2-4.0.0.1-1, lifetime=655351d21h:CDMA-RP:(out) setup_rp_out_msg, ha=5.0.0.2 coa=4.0.0.1 key=1
Cisco IOS Debug Command Reference - Commands A through D 331
debug backhaul-session-manager session through debug channel packetsdebug cdma pdsn a11
1d21h:%LINK-3-UPDOWN:Interface Virtual-Access2000, changed state to up1d21h:CDMA-RP:ipmobile_visitor add/delete=1, mn=8.0.2.132, ha=7.0.0.21d21h:%LINEPROTO-5-UPDOWN:Line protocol on Interface Virtual-Access2000,changed state to upRouter# debug cdma pdsn a11 packets eventsRouter# show debugCDMA:CDMA PDSN A11 packet debugging is on for mnid 000000000000001CDMA PDSN A11 events debugging is on for mnid 000000000000001
Router#*Mar 1 03:15:32.507:CDMA-RP:len=8, 01-00-00-00-00-00-00-10 convert to 000000000000001 (15digits), type=IMSI*Mar 1 03:15:32.511:CDMA-RP:extension type=38, len=0*Mar 1 03:15:32.511:CDMA-RP:extension type=38, len=0*Mar 1 03:15:32.511:CDMA-RP:extension type=38, len=0*Mar 1 03:15:32.511:CDMA-RP:extension type=32, len=20*Mar 1 03:15:32.511: 00 00 01 00 EE 1F FC 43 0A 7D F9 36 29 C2 BA 28*Mar 1 03:15:32.511: 5A 64 D5 9C*Mar 1 03:15:32.511:CDMA-RP:(req) process_rp_req, homeagent=5.0.0.2 coaddr=4.0.0.1*Mar 1 03:15:32.511: lifetime=1800 id=AF3BFE55-69A109D IMSI=000000000000001*Mar 1 03:15:32.511:CDMA-RP:(req) rp_req_create, ha=5.0.0.2, coa=4.0.0.1, key=1IMSI=000000000000001*Mar 1 03:15:32.511:CDMA-RP:(out) rp_reply session=5.0.0.2-4.0.0.1-1, lifetime=1800*Mar 1 03:15:32.511:CDMA-RP:(out) Setup RP out message, ha=5.0.0.2 coa=4.0.0.1 key=1*Mar 1 03:15:38.555:CDMA-RP:simple ip visitor added, mn=9.2.0.1, ha=0.0.0.0Router#*Mar 1 03:15:54.755:CDMA-RP:len=8, 01-00-00-00-00-00-00-10 convert to 000000000000001 (15digits), type=IMSI*Mar 1 03:15:54.755:CDMA-RP:extension type=38, len=0*Mar 1 03:15:54.755:CDMA-RP:extension type=32, len=20*Mar 1 03:15:54.755: 00 00 01 00 EA 9C C6 4C BA B9 F9 B6 DD C4 19 76*Mar 1 03:15:54.755: 51 5A 56 45*Mar 1 03:15:54.755:CDMA-RP:(req) process_rp_req, homeagent=5.0.0.2 coaddr=4.0.0.1*Mar 1 03:15:54.755: lifetime=0 id=AF3BFE6B-4616E475 IMSI=000000000000001*Mar 1 03:15:54.755:CDMA-RP:(req) rp_req_lifetime_zero 5.0.0.2-4.0.0.1-1*Mar 1 03:15:54.755: IMSI=000000000000001*Mar 1 03:15:54.755:CDMA-RP:(out) rp_reply session=5.0.0.2-4.0.0.1-1, lifetime=0*Mar 1 03:15:54.755:CDMA-RP:(out) Setup RP out message, ha=5.0.0.2 coa=4.0.0.1 key=1Router# debug cdma pdsn a11 event mnid 000000000000001Router# show debugCDMA:CDMA PDSN A11 events debugging is on for mnid 000000000000001
Router#*Mar 1 03:09:34.339:CDMA-RP:len=8, 01-00-00-00-00-00-00-10 convert to 000000000000001 (15digits), type=IMSI*Mar 1 03:09:34.339:CDMA-RP:(req) process_rp_req, homeagent=5.0.0.2 coaddr=4.0.0.1*Mar 1 03:09:34.339: lifetime=1800 id=AF3BFCEE-DC9FC751 IMSI=000000000000001*Mar 1 03:09:34.339:CDMA-RP:(req) rp_req_create, ha=5.0.0.2, coa=4.0.0.1, key=1IMSI=000000000000001*Mar 1 03:09:34.339:CDMA-RP:(out) rp_reply session=5.0.0.2-4.0.0.1-1, lifetime=1800*Mar 1 03:09:34.339:CDMA-RP:(out) Setup RP out message, ha=5.0.0.2 coa=4.0.0.1 key=1*Mar 1 03:09:40.379:CDMA-RP:simple ip visitor added, mn=9.2.0.1, ha=0.0.0.0Router#close the sessionRouter#*Mar 1 03:10:00.575:CDMA-RP:len=8, 01-00-00-00-00-00-00-10 convert to 000000000000001 (15digits), type=IMSI*Mar 1 03:10:00.575:CDMA-RP:(req) process_rp_req, homeagent=5.0.0.2 coaddr=4.0.0.1*Mar 1 03:10:00.575: lifetime=0 id=AF3BFD09-18040319 IMSI=000000000000001*Mar 1 03:10:00.575:CDMA-RP:(req) rp_req_lifetime_zero 5.0.0.2-4.0.0.1-1*Mar 1 03:10:00.575: IMSI=000000000000001*Mar 1 03:10:00.575:CDMA-RP:(out) rp_reply session=5.0.0.2-4.0.0.1-1, lifetime=0*Mar 1 03:10:00.575:CDMA-RP:(out) Setup RP out message, ha=5.0.0.2 coa=4.0.0.1 key=1Router# debug cdma pdsn a11 packet mnid 000000000000001
Router# show debug
CDMA:CDMA PDSN A11 packet debugging is on for mnid 000000000000001
Router#*Mar 1 03:13:37.803:CDMA-RP:extension type=38, len=0*Mar 1 03:13:37.803:CDMA-RP:extension type=38, len=0*Mar 1 03:13:37.803:CDMA-RP:extension type=38, len=0
Cisco IOS Debug Command Reference - Commands A through D332
debug backhaul-session-manager session through debug channel packetsdebug cdma pdsn a11
*Mar 1 03:13:37.803:CDMA-RP:extension type=32, len=20*Mar 1 03:13:37.803: 00 00 01 00 A8 5B 30 0D 4E 2B 83 FE 18 C6 9D C2*Mar 1 03:13:37.803: 15 BF 5B 57*Mar 1 03:13:51.575:CDMA-RP:extension type=38, len=0*Mar 1 03:13:51.575:CDMA-RP:extension type=32, len=20*Mar 1 03:13:51.575: 00 00 01 00 58 77 E5 59 67 B5 62 15 17 52 83 6D*Mar 1 03:13:51.579: DC 0A B0 5B
Cisco IOS Debug Command Reference - Commands A through D 333
debug backhaul-session-manager session through debug channel packetsdebug cdma pdsn a11
debug cdma pdsn accountingTo display debugmessages for accounting events, use the debugcdmapdsnaccounting command in privilegedEXEC mode. To disable debugging output, use the no form of this command.
debug cdma pdsn accounting
no cdma pdsn accounting
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.1(3)XS
This command was integrated into Cisco IOS Release 12.3(4)T.12.3(4)T
Examples The following is sample output from the debugcdmapdsnaccounting command:
Router# debug cdma pdsn accounting
CDMA PDSN accounting debugging is onRouter#*Jan 1 00:15:32:CDMA/ACCT:null vaccess in session_start*Jan 1 00:15:32:CDMA/ACCT: Current Attribute type:0x[1A] len:[9]*Jan 1 00:15:32:CDMA/ACCT: VSA Vid:5535 type:[44] len:[3] 01 Processing Y1*Jan 1 00:15:32:CDMA/ACCT: Setup airlink record received*Jan 1 00:15:32:CDMA/ACCT: Current Attribute type:0x[1A] len:[12]*Jan 1 00:15:32:CDMA/ACCT: VSA Vid:5535 type:[41] len:[6] 00 00 00 02 CDMA/ACCT:Processing Y2*Jan 1 00:15:32:CDMA/ACCT: Current Attribute type:0x[1A] len:[9]*Jan 1 00:15:32:CDMA/ACCT: VSA Vid:5535 type:[42] len:[3] 12 CDMA/ACCT: Processing Y3*Jan 1 00:15:32:CDMA/ACCT: Current Attribute type:0x[1F] len:[17] 30 30 30 30 30 30 30 3030 30 30 30 30 30 32 Processing A1*Jan 1 00:15:32:CDMA/ACCT: Current Attribute type:0x[1A] len:[12]*Jan 1 00:15:32:CDMA/ACCT: VSA Vid:5535 type:[9] len:[6] 04 04 04 05 Processing D3*Jan 1 00:15:32:CDMA/ACCT: Current Attribute type:0x[1A] len:[14]*Jan 1 00:15:32:CDMA/ACCT: VSA Vid:5535 type:[10] len:[8] 00 00 04 04 04 05 ProcessingD4*Jan 1 00:15:32:CDMA/ACCT: Current Attribute type:0x[1A] len:[9]*Jan 1 00:15:32:CDMA/ACCT: VSA Vid:5535 type:[44] len:[3] 02 Processing Y1*Jan 1 00:15:32:CDMA/ACCT: Start airlink record received*Jan 1 00:15:32:CDMA/ACCT: Current Attribute type:0x[1A] len:[12]*Jan 1 00:15:32:CDMA/ACCT: VSA Vid:5535 type:[41] len:[6] 00 00 00 02 CDMA/ACCT:Processing Y2*Jan 1 00:15:32:CDMA/ACCT: Current Attribute type:0x[1A] len:[9]*Jan 1 00:15:32:CDMA/ACCT: VSA Vid:5535 type:[42] len:[3] 13 CDMA/ACCT: Processing Y3*Jan 1 00:15:32:CDMA/ACCT: Current Attribute type:0x[1A] len:[10]*Jan 1 00:15:32:CDMA/ACCT: VSA Vid:5535 type:[11] len:[4] 00 02 Processing E1
Cisco IOS Debug Command Reference - Commands A through D334
debug backhaul-session-manager session through debug channel packetsdebug cdma pdsn accounting
*Jan 1 00:15:32:CDMA/ACCT: Current Attribute type:0x[1A] len:[10]*Jan 1 00:15:32:CDMA/ACCT: VSA Vid:5535 type:[12] len:[4] 00 F1 Processing F1
Cisco IOS Debug Command Reference - Commands A through D 335
debug backhaul-session-manager session through debug channel packetsdebug cdma pdsn accounting
debug cdma pdsn accounting flowTo display debug messages for accounting flow, use the debugcdmapdsnaccountingflowcommand inprivileged EXEC mode. To disable debugging output, use the no form of this command.
debug cdma pdsn accounting flow
no debug cdma pdsn accounting flow
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(2)XC
This command was integrated into Cisco IOS Release 12.3(4)T.12.3(4)T
Examples The following is sample output from the debugcdmapdsnaccountingflowcommand:
Router# debug cdma pdsn accounting flow
CDMA PDSN flow based accounting debugging is onpdsn-6500#01:59:40:CDMA-SM:cdma_pdsn_flow_acct_upstream sess id 1 flow type 0 bytes 100 addr 20.20.20.101:59:40:CDMA-SM:cdma_pdsn_flow_acct_downstream sess id 1 flow type 0 bytes 100 addr20.20.20.1
Cisco IOS Debug Command Reference - Commands A through D336
debug backhaul-session-manager session through debug channel packetsdebug cdma pdsn accounting flow
debug cdma pdsn accounting time-of-dayTo display the timer value, use the debugcdmapdsnaccounting time-of-day command in privileged EXECmode. To disable debugging output, use the no form of this command.
debug cdma pdsn accounting time-of-day
no debug cdma pdsn accounting time-of-day
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.1(3)XS
This command was integrated into Cisco IOS Release 12.3(4)T.12.3(4)T
Examples The following is sample output from the debugcdmapdsnaccountingtime-of-daycommand:
Router# debug cdma pdsn accounting time-of-day
CDMA PDSN accounting time-of-day debugging is onFeb 15 19:13:23.634:CDMA-TOD:Current timer expiring in 22 secondsFeb 15 19:13:24.194:%SYS-5-CONFIG_I:Configured from console by consoleRouter#Feb 15 19:13:45.635:CDMA-TOD:Timer expired...Rearming timerFeb 15 19:13:45.635:CDMA-TOD:Gathering session infoFeb 15 19:13:45.635:CDMA-TOD:Found 0 sessions
Cisco IOS Debug Command Reference - Commands A through D 337
debug backhaul-session-manager session through debug channel packetsdebug cdma pdsn accounting time-of-day
debug cdma pdsn clusterTo display the error messages, event messages, and packets received, use the debugcdmapdsncluster commandin privileged EXEC mode. To disable debugging output, use the no form of this command.
debug cdma pdsn cluster message [error| events| packets] redundancy [error| events| packets]
no debug cdma pdsn cluster message [error| events| packets] redundancy [error| events| packets]
Syntax Description Displays cluster messages for errors, events andpackets received.
message
Displays redundancy information for errors, events,and sent or received packets.
redundancy
Displays either cluster or redundancy error messages.error
Displays either all cluster or all redundancy events.events
Displays all transmitted or received cluster orredundancy packets.
packets
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.1(3)XS
This command was integrated into Cisco IOS Release 12.3(4)T.12.3(4)T
Usage Guidelines This debug is only allowed on PDSN c6-mz images, and helps to monitor prepaid information.
Examples The following is sample output from the debugcdmapdsnclustercommand:
Router# debug cdma pdsn cluster ?message Debug PDSN cluster controller messagesredundancy Debug PDSN cluster controller redundancy
Cisco IOS Debug Command Reference - Commands A through D338
debug backhaul-session-manager session through debug channel packetsdebug cdma pdsn cluster
debug cdma pdsn ipv6To display IPV6 error or event messages, use the debug cdma pdsn IPV6 command in privileged EXECmode.To disable debug messages, use the no form of this command.
debug cdma pdsn ipv6
no debug cdma pdsn ipv6
Syntax Description There are no arguments or keywords for this command.
Command Default No default behavior or values.
Command History ModificationRelease
This command was introduced.12.3(14)YX
This command was integrated into Cisco IOS Release 12.4(11)T.12.4(11)T
Usage Guidelines The following example illustrates the debugcdmapdsnipv6command:
Router# debug cdma pdsn ipv6
Cisco IOS Debug Command Reference - Commands A through D 339
debug backhaul-session-manager session through debug channel packetsdebug cdma pdsn ipv6
debug cdma pdsn prepaidTo display debug messages about prepaid flow, use the debugcdmapdsnprepaid command in privilegedEXEC mode. To disable debugging output, use the no form of this command.
debug cdma pdsn prepaid
no debug cdma pdsn prepaid
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(8)BY
This command was integrated into Cisco IOS Release 12.3(4)T.12.3(4)T
Usage Guidelines This debug is only allowed on PDSN c6-mz images, and helps to monitor prepaid information.
Examples The following is sample output from the debugcdmapdsnprepaidcommand:
Router# debug cdma pdsn prepaid*Mar 1 00:09:38.391: CDMA-PREPAID: Initialized the authorization request*Mar 1 00:09:38.391: CDMA-PREPAID: Added username into A-V list*Mar 1 00:09:38.391: CDMA-PREPAID: Added CLID into A-V list*Mar 1 00:09:38.391: CDMA-PREPAID: Added session id for prepaid*Mar 1 00:09:38.391: CDMA-PREPAID: Added correlation id into A-V list*Mar 1 00:09:38.391: CDMA-PREPAID: Added auth reason for prepaid into A-V list*Mar 1 00:09:38.391: CDMA-PREPAID: Added USER_ID for prepaid*Mar 1 00:09:38.391: CDMA-PREPAID: Added service id for prepaid*Mar 1 00:09:38.391: CDMA-PREPAID: Built prepaid VSAs*Mar 1 00:09:38.391: CDMA-PREPAID: Sent the request to AAA*Mar 1 00:09:38.391: CDMA-PREPAID: Auth_reason: CRB_RSP_PEND_INITIAL_QUOTA*Mar 1 00:09:38.395: CDMA-PREPAID: Received prepaid response: status 2*Mar 1 00:09:38.395: CDMA-PREPAID: AAA authorised parms being processed*Mar 1 00:09:38.395: CDMA-PREPAID: Attr in Grp Prof: crb-entity-type*Mar 1 00:09:38.395: (0x4B000000) CDMA/PREPAID: AAA_AT_CRB_ENTITY_TYPE*Mar 1 00:09:38.395: (0x4B000000) CDMA/PREPAID: entity type returns 1*Mar 1 00:09:38.395: CDMA-PREPAID: Attr in Grp Prof: crb-duration*Mar 1 00:09:38.395: (0x4B000000) CDMA/PREPAID: AAA_AT_CRB_DURATION*Mar 1 00:09:38.395: (0x4B000000) CDMA/PREPAID: duration returns 120*Mar 1 00:09:38.395: CDMA-PREPAID: Retrieved attributes successfully*Mar 1 00:09:38.395: CDMA-PREPAID: Reset duration to 120, mn 9.3.0.1*Mar 1 00:09:38.395: CDMA-PREPAID: : Started duration timer for 120 sec
Cisco IOS Debug Command Reference - Commands A through D340
debug backhaul-session-manager session through debug channel packetsdebug cdma pdsn prepaid
debug cdma pdsn qosTo display debug messages about quality of service features, use the debugcdmapdsnqos command inprivileged EXEC mode. To disable debug messages, use the no form of this command.
debug cdma pdsn qos
no debug cdma pdsn qos
Syntax Description There are no arguments or keywords for this command.
Command Default There are no default values for this command.
Command History ModificationRelease
This command was introduced.12.3(8)XW
This command was integrated into Cisco IOS Release 12.4(11)T.12.4(11)T
Examples There are currently no sample outputs for this command.
Cisco IOS Debug Command Reference - Commands A through D 341
debug backhaul-session-manager session through debug channel packetsdebug cdma pdsn qos
debug cdma pdsn resource-managerTo display debug messages that help you monitor the resource-manager information, use thedebugcdmapdsnresource-managercommand in privileged EXEC mode. To disable debugging output, usethe no form of this command.
debug cdma pdsn resource-manager [error| events]
no debug cdma pdsn resource-manager [error| events]
Syntax Description Displays Packet Data Service node (PDSN) resourcemanager errors.
errors
Displays PDSN resource manager events.events
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(8)BY
This command was integrated into Cisco IOS Release 12.3(4)T.12.3(4)T
Examples The following is sample output from the debugcdmapdsresource-managercommand:
Router# debug cdma pdsn resource-manager
errors CDMA PDSN resource manager errorsevents CDMA PDSN resource manager events
Cisco IOS Debug Command Reference - Commands A through D342
debug backhaul-session-manager session through debug channel packetsdebug cdma pdsn resource-manager
debug cdma pdsn selectionTo display debug messages for the intelligent Packet Data Serving Node (PDSN) selection feature, use thedebugcdmapdsnselectioncommand in privileged EXECmode. To disable debugging output, use the no formof this command.
debug cdma pdsn selection {errors| events| packets}
no debug cdma pdsn selection {errors| events| packets}
Syntax Description Displays PDSN selection errors.errors
Displays PDSN selection events.events
Displays transmitted or received packets.packets
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.1(3)XS
This command was integrated into Cisco IOS Release 12.3(4)T.12.3(4)T
Examples The following is sample output from the debugcdmapdsnselectioncommand with the keyword eventsspecified:
Router# debug cdma pdsn selection events
CDMA PDSN selection events debugging is onRouter#00:27:46: CDMA-PSL: Message(IN) pdsn 51.4.2.40 interface 70.4.2.4000:27:46: Keepalive 1000:27:46: Count 000:27:46: Capacity 1600000:27:46: Weight 000:27:46: Hostname 11 7206-PDSN-200:27:46: CDMA-PSL: Reset keepalive, pdsn 51.4.2.40 current 10 new 1000:27:46: CDMA-PSL: Message processed, pdsn 51.4.2.40 tsize 0 pendings 000:27:47: CDMA-PSL: Send KEEPALIVE, len 3200:27:47: CDMA-PSL: Message(OUT) dest 224.0.0.1100:27:47: Keepalive 1000:27:47: Count 100:27:47: Capacity 1600000:27:47: Weight 0
Cisco IOS Debug Command Reference - Commands A through D 343
debug backhaul-session-manager session through debug channel packetsdebug cdma pdsn selection
00:27:47: Hostname 11 7206-PDSN-100:27:47: CDMA-PSL: RRQ sent, s=70.4.1.40 (FastEthernet0/1), d=224.0.0.11
Cisco IOS Debug Command Reference - Commands A through D344
debug backhaul-session-manager session through debug channel packetsdebug cdma pdsn selection
debug cdma pdsn service-selectionTo display debug messages for service selection, use the debugcdmapdsnservice-selectioncommand inprivileged EXEC mode. To disable debugging output, use the no form of this command.
debug cdma pdsn service-selection
no debug cdma pdsn service-selection
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.1(3)XS
This command was integrated into Cisco IOS Release 12.3(4)T.12.3(4)T
Examples The following is sample output from the debugcdmapdsnservice-selection command:
Router# debug cdma pdsn service-selectionCDMA PDSN service provisioning debugging is onRouter#1d02h:%LINK-3-UPDOWN:Interface Virtual-Access3, changed state to up1d02h:Vi3 CDMA-SP:user_class=1, ms_ipaddr_req=1, apply_acl=01d02h:Vi3 CDMA-SP:Adding simple ip flow, user=bsip, mn=6.0.0.2,1d02h:%LINEPROTO-5-UPDOWN:Line protocol on Interface Virtual-Access3,changed state to up
Cisco IOS Debug Command Reference - Commands A through D 345
debug backhaul-session-manager session through debug channel packetsdebug cdma pdsn service-selection
debug cdma pdsn sessionTo display debug messages for Session Manager errors, events, and packets, use thedebugcdmapdsnsessioncommand in privileged EXEC mode. To disable debugging output, use the no formof this command.
debug cdma pdsn session [errors| events]
no debug cdma pdsn session [errors| events]
Syntax Description (Optional) Displays session protocol errors.errors
(Optional) Displays session events.events
Command Default If the command is entered without any optional keywords, all of the types of debug information are enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.1(3)XS
Keywords were made optional.12.2(8)BY
This command was integrated into Cisco IOS Release 12.3(4)T.12.3(4)T
Examples The following is sample output from the debugcdmapdsnsessioncommand:
Router# debug cdma pdsn session events
CDMA PDSN session events debugging is onRouter# debug cdma pdsn session errors
CDMA PDSN session errors debugging is onRouter# show debug
CDMA:CDMA PDSN session events debugging is onCDMA PDSN session errors debugging is on
Router#*Jan 1 00:22:27:CDMA-SM:create_session 5.5.5.5-4.4.4.5-2*Jan 1 00:22:27:CDMA-SM:create_tunnel 5.5.5.5-4.4.4.5*Jan 1 00:22:27:%LINK-3-UPDOWN:Interface Virtual-Access1, changed state to up*Jan 1 00:22:29:CDMA-SM:create_flow mn=0.0.0.0, ha=8.8.8.8 [email protected]*Jan 1 00:22:30:%LINEPROTO-5-UPDOWN:Line protocol on Interface Virtual-Access1, changedstate to up
Cisco IOS Debug Command Reference - Commands A through D346
debug backhaul-session-manager session through debug channel packetsdebug cdma pdsn session
debug cdpTo enable debugging of the Cisco Discovery Protocol (CDP), use the debugcdpcommand in privileged EXECmode. To disable debugging output, use the no form of this command.
debug cdp {packets| adjacency| events}
no debug cdp {packets| adjacency| events}
Syntax Description Enables packet-related debugging output.packets
Enables adjacency-related debugging output.adjacency
Enables output related to error messages, such asdetecting a bad checksum.
events
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced in a release earlier than Cisco IOS Release12.4(2)T.
12.4(2)T
This commandwasmodified. The debug output was enhanced to display locationType-Length-Values (TLVs), location-server TLVs, and application TLV-relateddebugs.
12.2(55)SE
Usage Guidelines Use debugcdp commands to display information about CDP packet activity, activity between CDP neighbors,and various CDP events.
Examples The following is sample output from the debugcdppackets,debugcdpadjacency,anddebugcdpeventscommands:
Router# debug cdp packetsCDP packet info debugging is onRouter# debug cdp adjacencyCDP neighbor info debugging is onRouter# debug cdp eventsCDP events debugging is onCDP-PA: Packet sent out on Ethernet0CDP-PA: Packet received from gray.cisco.com on interface Ethernet0CDP-AD: Deleted table entry for violet.cisco.com, interface Ethernet0CDP-AD: Interface Ethernet2 coming upCDP-EV: Encapsulation on interface Serial2 failed
Cisco IOS Debug Command Reference - Commands A through D 347
debug backhaul-session-manager session through debug channel packetsdebug cdp
Related Commands DescriptionCommand
Configures location support in CDP.cdp tlv
Displays information about CDP TLVs.show cdp tlv
Cisco IOS Debug Command Reference - Commands A through D348
debug backhaul-session-manager session through debug channel packetsdebug cdp
debug cdp ipTo enable debug output for the IP routing information that is carried and processed by the Cisco DiscoveryProtocol (CDP), use the debugcdpipcommand in privileged EXEC mode. To disable debugging output, usethe no form of this command.
debug cdp ip
no debug cdp ip
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines CDP is a media- and protocol-independent device-discovery protocol that runs on all Cisco routers.
You can use the debugcdpipcommand to determine the IP network prefixes CDP is advertising and whetherCDP is correctly receiving this information from neighboring routers.
Use the debugcdpipcommand with the debugiprouting command to debug problems that occur whenon-demand routing (ODR) routes are not installed in the routing table at a hub router. You can also use thedebugcdpipcommand with the debugcdppacketanddebugcdpadjacency commands along withencapsulation-specific debug commands to debug problems that occur in the receipt of CDP IP information.
Examples The following is sample output from thedebugcdpip command. This example shows the transmission ofIP-specific information in a CDP update. In this case, three network prefixes are being sent, each with adifferent network mask.
Router# debug cdp ipCDP-IP: Writing prefix 172.1.69.232.112/28CDP-IP: Writing prefix 172.19.89.0/24CDP-IP: Writing prefix 11.0.0.0/8In addition to these messages, you might see the following messages:
• This message indicates that CDP is attempting to install the prefix 172.16.1.0/24 into the IP routingtable:
CDP-IP: Updating prefix 172.16.1.0/24 in routing table
• This message indicates a protocol error occurred during an attempt to decode an incoming CDP packet:
CDP-IP: IP TLV length (3) invalid
• This message indicates the receipt of the IP prefix 172.16.1.0/24 from a CDP neighbor connected viaEthernet interface 0/0. The neighbor IP address is 10.0.01.
CDP-IP: Reading prefix 172.16.1.0/24 source 10.0.0.1 via Ethernet0/0
Cisco IOS Debug Command Reference - Commands A through D 349
debug backhaul-session-manager session through debug channel packetsdebug cdp ip
Related Commands DescriptionCommand
Displays information on RIP routing table updatesand route cache updates.
debug ip routing
Cisco IOS Debug Command Reference - Commands A through D350
debug backhaul-session-manager session through debug channel packetsdebug cdp ip
debug cefTo enable the display of information about Cisco Express Forwarding events, use the debugcefcommand inprivileged EXEC mode. To disable the display of Cisco Express Forwarding events, use the no form of thiscommand.
debug cef {all| assert| background| broker| consistency-check| elog| epoch| fib [attached export| subblock]|hardware {notification| queries}| hash| high-availability| interest| interface| iprm| issu| loadinfo| memory|non-ip| path [extension| list| scope]| subtree context| switching background| table| xdr}
no debug cef {all| assert| background| broker| consistency-check| elog| epoch| fib [attached export|subblock]| hardware {notification| queries}| hash| high-availability| interest| interface| iprm| issu|loadinfo| memory| non-ip| path [extension| list| scope]| subtree context| switching background| table|xdr}
Syntax Description Displays debug messages for all Cisco ExpressForwarding events.
all
Displays debug messages for Cisco ExpressForwarding assert events.
assert
Displays debug messages for Cisco ExpressForwarding background events.
background
Displays debug messages for Cisco ExpressForwarding broker events.
broker
Displays debug messages for Cisco ExpressForwarding consistency checker events.
consistency-check
Displays debug messages for Cisco ExpressForwarding elog events.
elog
Displays debug messages for Cisco ExpressForwarding epoch events.
epoch
Displays debug messages for Cisco ExpressForwarding Forwarding Information Base entryevents.
fib [attachedexport | subblock]
Displays debug messages for Cisco ExpressForwarding hardware API notifications or hardwareAPI queries.
hardware {notification | queries}
Displays debug messages for Cisco ExpressForwarding load-balancing hash algorithms.
hash
Cisco IOS Debug Command Reference - Commands A through D 351
debug backhaul-session-manager session through debug channel packetsdebug cef
Displays debug messages for Cisco ExpressForwarding high availability events.
high-availability
Displays debug messages for Cisco ExpressForwarding interest list events.
interest
Displays debug messages for Cisco ExpressForwarding interface events.
interface
Displays debug messages for Cisco ExpressForwarding IP rewritemanager events. (This keywordis not available in Cisco IOS Release 12.2(33)SRA.)
iprm
Displays debug messages for Cisco ExpressForwarding In Service Software Upgrade (ISSU)events.
issu
Displays debug messages for Cisco ExpressForwarding loadinfo events.
loadinfo
Displays debug messages for Cisco ExpressForwarding memory events.
memory
Displays debug messages for Cisco ExpressForwarding non-IP entry events.
non-ip
Displays debug messages for Cisco ExpressForwarding path events.
path [extension | list | scope]
Displays debug messages for Cisco ExpressForwarding subtree context events.
subtree context
Displays debug messages for Cisco ExpressForwarding switching background events.
switching background
Displays debug messages for Cisco ExpressForwarding table events.
table
Displays debug messages for Cisco ExpressForwarding External Data Representation (XDR)events.
xdr
Command Default Debugging information about Cisco Express Forwarding events is not displayed.
Command Modes Privileged EXEC (#)
Cisco IOS Debug Command Reference - Commands A through D352
debug backhaul-session-manager session through debug channel packetsdebug cef
Command History ModificationRelease
This command was introduced.
The debugceffibattachedexportcommand rerplaces the debugipcefadjfibcommand.
12.2(25)S
This command was integrated into Cisco IOS Release 12.2(28)SB andimplemented on the Cisco 10000 series routers.
12.2(28)SB
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SXH.12.2(33)SXH
This command was integrated into Cisco IOS Release 12.4(20)T.12.4(20)T
Usage Guidelines Because debugging output is assigned high priority in the CPU process, you should use debug commandsonly to troubleshoot specific problems or during troubleshooting sessions with Cisco technical support staff.Moreover, you should use debug commands during periods of lower network traffic and fewer users. Debuggingduring these periods decreases the likelihood that increased debug command processing overhead will affectsystem use.
Examples The following is sample output from the debugcefall command:
Router# debug cef all06:23:38: HW-API: Counter poll: Label[label=implicit-null]06:23:38: HW-API: Counter poll: Label[label=implicit-null]06:23:38: HW-API: Counter poll: Label[label=implicit-null]06:23:43: FIBbg: Timer 'FIB checkers: IPv4 scan-rib-ios scanner' expired, calling 0x40FA03FC, context 0x00010003)06:23:43: FIBbg: Restarting timer 'FIB checkers: IPv4 scan-rib-ios scanner' withdelay 6000006:23:43: FIBbg: Timer 'FIB checkers: IPv4 scan-ios-rib scanner' expired, calling 0x40FA03FC, context 0x00010004)06:23:43: FIBbg: Restarting timer 'FIB checkers: IPv4 scan-ios-rib scanner' withdelay 6000006:23:43: FIBbg: Timer 'FIB checkers: IPv6 scan-ios-rib scanner' expired, calling 0x40FA03FC, context 0x00020004)06:23:43: FIBbg: Restarting timer 'FIB checkers: IPv6 scan-ios-rib scanner' withdelay 6000006:23:43: FIBbg: Timer 'FIB checkers: IPv4 scan-rp-lc scanner' expired, calling0x40FA03FC, context 0x00010002)06:23:43: FIBbg: Restarting timer 'FIB checkers: IPv4 scan-rp-lc scanner' with delay 6000006:23:43: FIBbg: Timer 'FIB checkers: IPv6 scan-rp-lc scanner' expired, calling0x40FA03FC, context 0x00020002)06:23:43: FIBbg: Restarting timer 'FIB checkers: IPv6 scan-rp-lc scanner' with delay 6000006:23:48: HW-API: Counter poll: Label[label=implicit-null]06:23:48: HW-API: Counter poll: Label[label=implicit-null]06:23:48: HW-API: Counter poll: Label[label=implicit-null]06:23:58: HW-API: Counter poll: Label[label=implicit-null]06:24:06: FIBtable: IPv4: Event modified, 0.0.0.0/0, vrf Default, 1 path, flags0042000506:24:06: FIBpath: Configuring IPv4 path 444B2AB0 from rib (idb=NULL, gw=9.1.41.1, gw_table=0, rr=1) and host prefix 0.0.0.0
Cisco IOS Debug Command Reference - Commands A through D 353
debug backhaul-session-manager session through debug channel packetsdebug cef
06:24:06: FIBpath: Configured recursive-nexthop 9.1.41.1[0] 444B2AB0 path06:24:06: FIBfib: [v4-0.0.0.0/0 (44AAC750)] Mod type - null06:24:06: FIBtable: IPv4: Event up, default, 0.0.0.0/0, vrf Default, 1 path, flags 0042000506:24:06: FIBtable: IPv4: Adding route for 0.0.0.0/0 but route already exists. Trying modify.06:24:06: FIBpath: Configuring IPv4 path 444B2AA0 from rib (idb=NULL, gw=9.1.41.1, gw_table=0, rr=1) and host prefix 0.0.0.0sh ip06:24:06: FIBpath: Configured recursive-nexthop 9.1.41.1[0] 444B2AA0 path06:24:06: FIBfib: [v4-0.0.0.0/0 (44AAC750)] Mod type - null vrf06:24:07: FIBbg: Timer 'FIB checkers: IPv4 scan-hw-sw scanner' expired, calling0x40FA03FC, context 0x00010005)06:24:07: FIBbg: Restarting timer 'FIB checkers: IPv4 scan-hw-sw scanner' with delay 6000006:24:07: FIBbg: Timer 'FIB checkers: IPv4 scan-sw-hw scanner' expired, calling0x40FA03FC, context 0x00010006)06:24:07: FIBbg: Restarting timer 'FIB checkers: IPv4 scan-sw-hw scanner' with delay 60000Name Default RD Interfacesred 1:1 Ethernet4/0/5
Related Commands DescriptionCommand
Enables Cisco Express Forwarding consistencychecker table values by type and parameter.
cef table consistency-check
Clears the Cisco Express Forwarding tables.clear cef table
Clears Cisco Express Forwarding inconsistencystatistics and records found by the Cisco ExpressForwarding consistency checkers.
clear ip cef inconsistency
Enables the collection of events that affect entries inthe Cisco Express Forwarding tables.
debug ip cef table
Displays Cisco Express Forwarding consistencychecker table values.
show cef table consistency-check
Displays Cisco Express Forwarding IP prefixinconsistencies.
show ip cef inconsistency
Cisco IOS Debug Command Reference - Commands A through D354
debug backhaul-session-manager session through debug channel packetsdebug cef
debug cell-hwic driverTo debug the Cisco IOS driver for the cellular interface, use the debugcell-hwicdrivercommand in EXECmode.
debug cell-hwic slotwic_slotport driver {crcdump| errdump| errors}
Syntax Description Numeric values that indicate the router slot, WANinterface card (WIC) slot, and port.
slot/wic_slot/port
CRC error details.crcdump
Other error details.errdump
Errors debugging.errors
Command Default None
Command Modes EXEC (#)
Command History ModificationRelease
This command was introduced.12.4(11)XV
This command was integrated into Cisco IOS Release 12.4(15)T.12.4(15)T
This command is supported in the Cisco IOS Release 12.2SX train. Supportin a specific 12.2SX release of this train depends on your feature set, platform,and platform hardware.
12.2SX
Usage Guidelines Use this command for debugging purposes only.
Related Commands DescriptionCommand
Debugs cellular async.debug cellular messages async
Prints Cisco IOS data path debug messages.debug cellular messages data
Displays Cisco IOS firmware information.debug cellular firmware
Cisco IOS Debug Command Reference - Commands A through D 355
debug backhaul-session-manager session through debug channel packetsdebug cell-hwic driver
DescriptionCommand
Prints management path messages, such as CnS.debug cellular messages management
Prints diagnostics monitor (DM) messages from theQualcomm CDMA chipset.
debug cellular messages dm
Redirects the Nios II console driver messages todisplay them in the Cisco IOS router consoleenvironment.
debug cell-hwic virt-con
Cisco IOS Debug Command Reference - Commands A through D356
debug backhaul-session-manager session through debug channel packetsdebug cell-hwic driver
debug cell-hwic firmwareTo see the Cisco IOS firmware information, use the debugcell-hwicfirmwarecommand in EXEC mode.
debug cellular slotwic_slotport firmware
Syntax Description Numeric values that indicate the router slot, WANinterface card (WIC) slot, and port.
slot/wic_slot/port
Command Default None
Command Modes EXEC
Command History ModificationRelease
This command was introduced.12.4(11)XV
This command was integrated into Cisco IOS Release 12.4(15)T.12.4(15)T
This command was integrated into Cisco IOS Release 12.4(22)YB1.12.4(22)YB1
Usage Guidelines Use this command for debugging purposes only.
Related Commands DescriptionCommand
Debugs cellular async.debug cellular messages async
Prints Cisco IOS data path debug messages.debug cellular messages data
Debugs the Cisco IOS driver.debug cellular firmware
Prints management path messages, such as CnS.debug cellular messages management
Prints diagnostics monitor (DM) messages from theQualcomm CDMA chipset.
debug cellular messages dm
Redirects the Nios II console driver messages todisplay them in the Cisco IOS router consoleenvironment.
debug cell-hwic virt-con
Cisco IOS Debug Command Reference - Commands A through D 357
debug backhaul-session-manager session through debug channel packetsdebug cell-hwic firmware
debug cellular messages allTo print all Cisco IOS driver debug messages, use the debugcellularmessagesallcommand in EXEC mode.
debug cellular slotwic_slotportmessages all
Syntax Description Numeric values that indicate the router slot, WANinterface card (WIC) slot, and port.
slot/wic_slot/port
Command Default None
Command Modes EXEC
Command History ModificationRelease
This command was introduced.12.4(11)XV
This command was integrated into Cisco IOS Release 12.4(15)T.12.4(15)T
Usage Guidelines Use this command for debugging purposes only.
Related Commands DescriptionCommand
Debugs cellular async.debug cellular messages async
Prints Cisco IOS data path debug messages.debug cellular messages data
Debugs the Cisco IOS driver.debug cell-hwic driver
Displays Cisco IOS firmware information.debug cell-hwic firmware
Prints management path messages, such as CnS.debug cellular messages management
Prints diagnostics monitor (DM) messages from theQualcomm CDMA chipset.
debug cellular messages dm
Redirects the Nios II console driver messages todisplay them in the Cisco IOS router consoleenvironment.
debug cellular messages virt-con
Cisco IOS Debug Command Reference - Commands A through D358
debug backhaul-session-manager session through debug channel packetsdebug cellular messages all
Cisco IOS Debug Command Reference - Commands A through D 359
debug backhaul-session-manager session through debug channel packetsdebug cellular messages all
debug cellular messages asyncTo debug cellular async, use the debugcellularmessagesasynccommand in EXEC mode.
debug cellular slotwic_slotportmessages async
Syntax Description Numeric values that indicate the router slot, WANinterface card (WIC) slot, and port.
slot/wic_slot/port
Command Default None
Command Modes EXEC (#)
Command History ModificationRelease
This command was introduced.12.4(11)XV
This command was integrated into Cisco IOS Release 12.4(15)T.12.4(15)T
This command is supported in the Cisco IOS Release 12.2SX train. Supportin a specific 12.2SX release of this train depends on your feature set, platform,and platform hardware.
12.2SX
Usage Guidelines Use this command for debugging purposes only.
Related Commands DescriptionCommand
Prints all Cisco IOS driver debug messages.debug cellular messages all
Prints Cisco IOS data path debug messages.debug cellular messages data
Debugs the Cisco IOS driver.debug cellular driver
Displays Cisco IOS firmware information.debug cellular firmware
Prints management path messages, such as CnS.debug cellular messages management
Prints diagnostics monitor (DM) messages from theQualcomm CDMA chipset.
debug cellular messages dm
Cisco IOS Debug Command Reference - Commands A through D360
debug backhaul-session-manager session through debug channel packetsdebug cellular messages async
DescriptionCommand
Redirects the Nios II console driver messages todisplay them in the Cisco IOS router consoleenvironment.
debug cellular messages virt-con
Cisco IOS Debug Command Reference - Commands A through D 361
debug backhaul-session-manager session through debug channel packetsdebug cellular messages async
debug cellular messages dataTo print Cisco IOS data path debug messages, use the debugcellularmessagesdatacommand in EXECmode.
show cellular slotwic_slotportmessages data
Syntax Description Numeric values that indicate the router slot, WANinterface card (WIC) slot, and port.
slot/wic_slot/port
Command Default None
Command Modes EXEC
Command History ModificationRelease
This command was introduced.12.4(11)XV
This command was integrated into Cisco IOS Release 12.4(15)T.12.4(15)T
Usage Guidelines Use this command for debugging purposes only.
Related Commands DescriptionCommand
Prints all Cisco IOS driver debug messages.debug cellular messages all
Debugs cellular async.debug cellular messages async
Debugs the Cisco IOS driver.debug cell-hwic driver
Displays Cisco IOS firmware information.debug cell-hwic firmware
Prints management path messages, such as CnS.debug cellular messages management
Prints diagnostics monitor (DM) messages from theQualcomm CDMA chipset.
debug cellular messages dm
Redirects the Nios II console driver messages todisplay them in the Cisco IOS router consoleenvironment.
debug cellular messages virt-con
Cisco IOS Debug Command Reference - Commands A through D362
debug backhaul-session-manager session through debug channel packetsdebug cellular messages data
Cisco IOS Debug Command Reference - Commands A through D 363
debug backhaul-session-manager session through debug channel packetsdebug cellular messages data
debug cellular messages dmTo print Diagnostics Monitor (DM) messages from the Qualcomm CDMA chipset, use thedebugcellularmessagesdmcommand in EXEC mode.
debug cellular slotwic_slotportmessages dm
Syntax Description Numeric values that indicate the router slot, WANinterface card (WIC) slot, and port.
slot/wic_slot/port
Command Default There is no default for this command.
Command Modes EXEC
Command History ModificationRelease
This command was introduced.12.4(11)XV
This command was integrated into Cisco IOS Release 12.4(15)T.12.4(15)T
Usage Guidelines Use this command for debugging purposes only.
Related Commands DescriptionCommand
Prints all Cisco IOS driver debug messages.debug cellular messages all
Debugs cellular async.debug cellular messages async
Prints Cisco IOS data path debug messages.debug cellular messages data
Debugs the Cisco IOS driver.debug cell-hwic driver
Displays Cisco IOS firmware information.debug cell-hwic firmware
Prints management path messages, such as CnS.debug cellular messages management
Redirects the Nios II console driver messages todisplay them in the Cisco IOS router consoleenvironment.
debug cellular messages virt-con
Cisco IOS Debug Command Reference - Commands A through D364
debug backhaul-session-manager session through debug channel packetsdebug cellular messages dm
Cisco IOS Debug Command Reference - Commands A through D 365
debug backhaul-session-manager session through debug channel packetsdebug cellular messages dm
debug cellular messages managementTo print management path messages, such as CnS, use the debugcellularmessagesmanagementcommandin EXEC mode.
debug cellular slotwic_slotportmessages management
Syntax Description Numeric values that indicate the router slot, WANinterface card (WIC) slot, and port.
slot/wic_slot/port
Command Default None
Command Modes EXEC
Command History ModificationRelease
This command was introduced.12.4(11)XV
This command was integrated into Cisco IOS Release 12.4(15)T.12.4(15)T
Usage Guidelines Use this command for debugging purposes only.
Related Commands DescriptionCommand
Prints all Cisco IOS driver debug messages.debug cellular messages all
Debugs cellular async.debug cellular messages async
Prints Cisco IOS data path debug messages.debug cellular messages data
Debugs the Cisco IOS driver.debug cell-hwic driver
Displays Cisco IOS firmware information.debug cell-hwic firmware
Redirects the Nios II console driver messages todisplay them in the Cisco IOS router consoleenvironment.
debug cellular messages virt-con
Cisco IOS Debug Command Reference - Commands A through D366
debug backhaul-session-manager session through debug channel packetsdebug cellular messages management
debug cellular messagesTo debug GPS or NMEA management messages, use the debug cellular messages command in privilegedEXEC mode.
debug cellular unitmessages {gps| nmea}
Syntax Description EHWIC Router slot, WIC slot, and port separated by slashes (for example, 0/1/0).For a fixed platform, the number is 0.
unit
Debugs GPS management messages.gps
Debugs NMEA management messages.nmea
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.Cisco IOS Release 15.3(3)M
Usage Guidelines Use this command to collect debug GPS or NMEA data for evaluation.
When the debug cellular messages nmea command is entered to troubleshoot NMEA streaming, a largeamount of output data is generated, especially once a GPS fix is obtained.
Note
Examples The following example shows how the debug cellular messages nmea command is used to gather NMEAtroubleshooting output data from an EHWIC:
Device# debug cellular 0/0/0 messages nmea
NMEA debugging is on
Device#
*Aug 15 17:03:42.631 PDT: Ignoring NMEA ID:5*Aug 15 17:03:42.635 PDT: big nmea token width 26*Aug 15 17:03:42.635 PDT: ecell_nmea_parse_gpgsv: num_satellites 10, num_of_sat in pak 2*Aug 15 17:03:42.635 PDT: ecell_nmea_parse_gpgsv: raw_satellite_info[i].sat_number 31,raw_satellite_info[i].elevation 11, raw_satellite_info[i].azimuth 314,raw_satellite_info[i].sig_noise_ratio 35*Aug 15 17:03:42.635 PDT: ecell_nmea_parse_gpgsv: raw_satellite_info[i].sat_number 21,raw_satellite_info[i].elevation 0, raw_satellite_info[i].azimuth 232,raw_satellite_info[i].sig_noise_ratio 0
Cisco IOS Debug Command Reference - Commands A through D 367
debug backhaul-session-manager session through debug channel packetsdebug cellular messages
*Aug 15 17:03:42.635 PDT: ecell_nmea_parse_gpgsv: raw_satellite_info[i].sat_number 0,raw_satellite_info[i].elevation 0, raw_satellite_info[i].azimuth 0,raw_satellite_info[i].sig_noise_ratio 80*Aug 15 17:03:42.635 PDT: ecell_nmea_parse_gpgsv: raw_satellite_info[i].sat_number 0,raw_satellite_info[i].elevation 0, raw_satellite_info[i].azimuth 0,raw_satellite_info[i].sig_noise_ratio 0*Aug 15 17:03:42.635 PDT: Ignoring NMEA ID:5*Aug 15 17:03:42.639 PDT: Ignoring NMEA ID:5*Aug 15 17:03:42.639 PDT: act_sat_no_str 09*Aug 15 17:03:42.639 PDT: lat_string 3724.984251*Aug 15 17:03:42.639 PDT: lat_deg 37, lat_min 24 lat_sec 98*Aug 15 17:03:42.639 PDT: lat_long 6974908*Aug 15 17:03:42.639 PDT: north_south Neast west = W in ecell_nmea_parse_gpgga*Aug 15 17:03:42.639 PDT: long_string 12155.124356*Aug 15 17:03:42.639 PDT: long_deg 121, long_min 55, long_sec 12*Aug 15 17:03:42.639 PDT: long_long 44381579east west = W*Aug 15 17:03:42.639 PDT: ecell_nmea_parse_gpgga: timestamp 1060641088, latitude 6974908,longitude 44381579, num of active sat 9, hdop 0.8, height_str 17.5*Aug 15 17:03:42.639 PDT: ecell_nmea_parse_gpgga: num of active sat 9*Aug 15 17:03:42.639 PDT: Ignoring NMEA ID:5*Aug 15 17:03:42.643 PDT: Ignoring NMEA ID:5*Aug 15 17:03:42.643 PDT: lat_string 3724.984251*Aug 15 17:03:42.643 PDT: lat_deg 37, lat_min 24 lat_sec 98*Aug 15 17:03:42.643 PDT: lat_long 6974908*Aug 15 17:03:42.643 PDT: north_south Neast west = W in ecell_nmea_parse_gprmc*Aug 15 17:03:42.643 PDT: long_string 12155.124356*Aug 15 17:03:42.643 PDT: long_deg 121, long_min 55, long_sec 12*Aug 15 17:03:42.643 PDT: long_long 44381579east west = W*Aug 15 17:03:42.643 PDT: ecell_nmea_parse_gprmc: timestamp 1060641088, latitude 6974908,longitude 44381579*Aug 15 17:03:42.643 PDT: date 150813 time: 233128.0
Examples The following example shows how the debug cellular messages gps command is used to gather GPStroubleshooting output data from an EHWIC:
Device# debug cellular 0/0/0 messages gps
Device# debug cellular 0/0/0 messages gps
GPS debugging is on
Device#
*Aug 15 17:15:52.975 PDT: ecell_set_gps_led: cw_mgmt->gps_info = 252F470, fpga_led_ctrl =843*Aug 15 17:15:52.975 PDT: no change in GPS state 3*Aug 15 17:16:02.975 PDT: ecell_set_gps_led: cw_mgmt->gps_info = 252F470, fpga_led_ctrl =843*Aug 15 17:16:02.975 PDT: no change in GPS state 3
Cisco IOS Debug Command Reference - Commands A through D368
debug backhaul-session-manager session through debug channel packetsdebug cellular messages
debug cellular messages smsTo debug SMS data path errors received on the modem, use the debug cellular messages sms command inprivileged EXEC mode.
debug cellular unitmessages sms
Syntax Description EHWIC Router slot, WIC slot, and port separated by slashes (for example, 0/1/0. Fora fixed platform, the number is 0.
unit
Command Default Privileged EXEC (#)
Command Modes
Command History ModificationRelease
This command was introduced.Cisco IOS Release 15.3(3)M
Usage Guidelines Use this command to collect debug SMS message information for evaluation.
Examples The following example shows the debugging of SMS messaging data on the modem:
Device# debug cellular 0/0/0 messages sms
Cisco IOS Debug Command Reference - Commands A through D 369
debug backhaul-session-manager session through debug channel packetsdebug cellular messages sms
debug cell-hwic virt-conTo redirect the Nios II console driver messages to display them in the Cisco IOS router console environment,use the debugcell-hwicvirt-concommand in EXEC mode.
debug cell-hwic slotwic_slotport virt-con {clear| disable| dump-data-structs| log| monitor| wrapper-on|wrapper-off}
Syntax Description Numeric values that indicate the router slot, WANinterface card (WIC) slot, and port.
slot/wic_slot/port
(Optional) Clears all virtual console debug logmessages.
clear
(Optional) Disables virtual console real-time debugmonitoring.
disable
(Optional) Dumps virtual console data structures.dump-data-structurs
(Optional) Displays virtual console messages fromthe debug log.
log
(Optional) Enables monitoring of real-time virtualconsole debug messages.
monitor
(Optional) Disables wraparound for virtual consolelog messages.
wrapper-on
(Optional) Enables wraparound for virtual consolelog messages.
wrapper-off
Command Default There is no default for this command.
Command Modes EXEC (#)
Command History ModificationRelease
This command was introduced.12.4(11)XV
This command was integrated into Cisco IOS Release 12.4(15)T.12.4(15)T
This command is supported in the Cisco IOS Release 12.2SX train. Supportin a specific 12.2SX release of this train depends on your feature set, platform,and platform hardware.
12.2SX
Cisco IOS Debug Command Reference - Commands A through D370
debug backhaul-session-manager session through debug channel packetsdebug cell-hwic virt-con
ModificationRelease
This command was integrated into Cisco IOS Release 12.4(22)YB1.12.4(22)YB1
Usage Guidelines Use this command for debugging purposes only.
Related Commands DescriptionCommand
Prints all Cisco IOS driver debug messages.debug cellular messages all
Debugs cellular async.debug cellular messages async
Prints Cisco IOS data path debug messages.debug cellular messages data
Debugs the Cisco IOS driver.debug cell-hwic driver
Displays Cisco IOS firmware information.debug cell-hwic firmware
Prints management path messages, such as CnS.debug cellular messages management
Prints diagnostics monitor (DM) messages from theQualcomm CDMA chipset.
debug cellular messages dm
Cisco IOS Debug Command Reference - Commands A through D 371
debug backhaul-session-manager session through debug channel packetsdebug cell-hwic virt-con
debug cem ls errorsTo debug connection errors or null data structures, use the debug cem ls errors command in privileged EXECmode. To disable this form of debugging, use the no form of this command.
debug cem ls errors
no debug cem ls errors
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced on the Cisco 7600 series routers.12.2(33)SRC
Usage Guidelines Use the show debug command to see debug information.
Examples The following command turns on CEM local switching error debugging:
Router# debug cem ls errors
Related Commands DescriptionCommand
Enables debugging of events relating to CEM localswitching.
debug cem ls events
Cisco IOS Debug Command Reference - Commands A through D372
debug backhaul-session-manager session through debug channel packetsdebug cem ls errors
debug cem ls eventsTo debug CEM local switching events, use the debug cem ls events command in privileged EXEC mode. Todisable this form of debugging, use the no form of this command.
debug cem ls events
no debug cem ls events
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced on the Cisco 7600 series routers.12.2(33)SRC
Usage Guidelines Use the show debug command to see debug information.
Examples The following command turns on debugging for CEM local switching events.
Router# debug cem ls events
Related Commands DescriptionCommand
Enables debugging of connection errors or null datastructures.
debug cem ls errors
Cisco IOS Debug Command Reference - Commands A through D 373
debug backhaul-session-manager session through debug channel packetsdebug cem ls events
debug ces-connTo display information from circuit emulation service (CES) clients, use the debugces-conncommand inprivileged EXEC mode. To disable debugging output, use the no form of this command.
debug ces-conn [all| errors| events]
no debug ces-conn
Syntax Description (Optional) Displays all error and event information.all
(Optional) Displays only error information.errors
(Optional) Displays only event information.events
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command is supported on Cisco 3600 series routers.12.1(5)XM
This command was integrated into Cisco IOS Release 12.2(4)T.12.2(4)T
Examples The following example shows debug output for a CES connection:
Router# debug ces-conn allCES all debugging is onRouter#Router# configure terminalEnter configuration commands, one per line. End with CNTL/Z.Router(config)# connect conn1 t1 3/0 1 atm1/0 1/100Router(config-ces-conn)# exitRouter(config)#*Mar 6 18:32:27:CES_CLIENT:vc QoS parameters are PCR = 590, CDV =5000, CAS_ENABLED = 1,partial fill = 0, multiplier = 8,cbr rate = 64,clock recovery = 0,service_type = 3, error method = 0,sdt_size = 196,billing count = 0*Mar 6 18:32:27:CES_CLIENT:attempt 1 to activate segment>
Cisco IOS Debug Command Reference - Commands A through D374
debug backhaul-session-manager session through debug channel packetsdebug ces-conn
debug cfmTo enable debugging of the data path of Ethernet connectivity fault management (CFM) on Cisco Catalyst6500 series switches, use the debug cfm command in privileged EXEC mode. To disable the debuggingfunction, use the no form of this command.
debug cfm {all| api| cfmpal| common| db| isr}
no debug cfm {all| api| cfmpal| common| db| isr}
Syntax Description Specifies all Catalyst 6500 switch-specific routeprocessor and switch processor (RP/SP) events.
all
Specifies Catalyst 6500 switch-specific applicationprogram interface (API) events.
api
Specifies general Catalyst 6500 switch debugging.cfmpal
Specifies common Catalyst 6500 switch RP/SPcomponents.
common
Specifies Catalyst 6500 switch CFM databasedebugging.
db
Specifies Catalyst 6500 switch-specific ingress CFMpacket debugging.
isr
Command Default Debugging is disabled.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SXI2
This commandwas integrated into Cisco IOSRelease 12.2(33)SRE.12.2(33)SRE
Usage Guidelines The output from this command is a log of activity.
Use this command to troubleshoot Ethernet CFM on Cisco Catalyst 6500 series switches.
Cisco IOS Debug Command Reference - Commands A through D 375
debug backhaul-session-manager session through debug channel packetsdebug cfm
Examples The following example shows output of the debug cfm all command:
Device# debug cfm all
CFM DB events debugging is onCFM Ingress ISR events debugging is onCFMPAL events debugging is onCFM API events debugging is onCFM RP/SP COMMON events debugging is onCFM packets debugging is on
Cisco IOS Debug Command Reference - Commands A through D376
debug backhaul-session-manager session through debug channel packetsdebug cfm
debug channel eventsTo display processing events on Cisco 7000 series routers that occur on the channel adapter interfaces of allinstalled adapters, use the debugchannelevents command in privileged EXEC mode. To disable debuggingoutput, use the no form of this command.
debug channel events
no debug channel events
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.0(3)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines This command displays CMCC adapter events that occur on the Channel Interface Processor (CIP) or ChannelPort Adapter (CPA) and is useful for diagnosing problems in an IBM channel attach network. It provides anoverall picture of the stability of the network. In a stable network, the debugchannelevents command doesnot return any information. If the command generates numerous messages, the messages can indicate thepossible source of the problems. To observe the statistic message (cip_love_letter) sent every 10 seconds, usethe debugchannellove command.
When configuring or making changes to a router or interface that supports IBM channel attach, enable thedebugchannelevents command. Doing so alerts you to the progress of the changes or to any errors that mightresult. Also use this command periodically when you suspect network problems.
Examples The following sample output is from the debugchannelevents command:
Router# debug channel eventsChannel3/0: cip_reset(), state administratively downChannel3/0: cip_reset(), state upChannel3/0: sending nodeidChannel3/0: sending command for vc 0, CLAW path C700, device C0The following line indicates that the CIP is being reset to an administrative down state:
Channel3/0: cip_reset(), state administratively downThe following line indicates that the CIP is being reset to an administrative up state:
Channel3/0: cip_reset(), state up
Cisco IOS Debug Command Reference - Commands A through D 377
debug backhaul-session-manager session through debug channel packetsdebug channel events
The following line indicates that the node ID is being sent to the CIP. This information is the same as the"Local Node" information under the showextendedchannelslot/portsubchannels command. The CIP needsto send this information to the host mainframe.
Channel3/0: sending nodeidThe following line indicates that a Common Link Access for Workstations (CLAW) subchannel commandis being sent from the Route Processor (RP) to the CIP. The value vc 0 indicates that the CIP will use virtualcircuit number 0 with this device. The virtual circuit number also shows up when you use thedebugchannelpacketscommand.
Channel3/0: sending command for vc 0, CLAW path C700, device C0The following is a sample output that is generated by the debugchanneleventscommand when a CMPC+ IPTG connection is activated with the host:
1d05h:Channel4/2:Received route UP for tg (768)1d05h:Adding STATIC ROUTE for vc:768The following is a sample output from the debugchanneleventscommand when a CMPC+ IP TG connectionis deactivated:
1d05h:Channel4/2:Received route DOWN for tg (768)1d05h:Deleting STATIC ROUTE for vc:768
Related Commands DescriptionCommand
Displays CIP love letter events.debug channel ilan
Displays per-packet debugging output.debug channel packets
Cisco IOS Debug Command Reference - Commands A through D378
debug backhaul-session-manager session through debug channel packetsdebug channel events
debug channel ilanTo display messages relating to configuration and bridging using Cisco Mainframe Channel Connection(CMCC) internal LANs and to help debug source-route bridging (SRB) problems related to CMCC internalLANs, use the debugchannelilan command in privileged EXEC mode. To disable debugging output, use theno form of this command.
debug channel ilan
no debug channel ilan
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.11.0(3)
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines The debug channel ilan command displays events related to CMCC internal LANs. This command is usefulfor debugging problems associated with CMCC internal LAN configuration. It is also useful for debuggingproblems related to SRB packet flows through internal LANs.
Examples The following is sample output from the debugchannelilan command:
Router# debug channel ilanChannel internal LANs debugging is onThe following line indicates that a packet destined for the CMCC via a configured internal MAC adapterconfigured on an internal LAN was dropped because the Logical Link Control (LLC) end station in CiscoIOS software did not exist:
CIP ILAN(Channel3/2-Token): Packet dropped - NULL LLCThe following line indicates that a packet destined for the CMCC via a configured internal MAC adapterconfigured on an internal LAN was dropped because the CMCC had not yet acknowledged the internal MACadapter configuration command:
Channel3/2: ILAN Token-Ring 3 - CIP internal MAC adapter not acknowledged DMAC(4000.7000.0001)SMAC(0c00.8123.0023)
Cisco IOS Debug Command Reference - Commands A through D 379
debug backhaul-session-manager session through debug channel packetsdebug channel ilan
Related Commands DescriptionCommand
Displays processing that occurs on the channel adapterinterfaces of all installed adapters.
debug channel events
Displays information about packets and framestransferred across a source-route bridge.
debug source bridge
Cisco IOS Debug Command Reference - Commands A through D380
debug backhaul-session-manager session through debug channel packetsdebug channel ilan
debug channel loveTo display Channel Interface Processor (CIP) love letter events, use the debugchannellove command inprivileged EXEC mode. To disable debugging output, use the no form of this command.
debug channel love
no debug channel love
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines This command displays CIP love letter events (an operating status or configuration message) that occur onthe CIP interface processor and is useful for diagnosing problems in an IBM channel attach network. It providesan overall picture of the stability of the network. In a stable network, the debugchannellove command returnsa statistic message (cip_love_letter) that is sent every 10 seconds. This command is valid for the Cisco 7000series routers only.
Examples The following is sample output from the debugchannellove command:
Router# debug channel loveChannel3/1: love letter received, bytes 3308Channel3/0: love letter received, bytes 3336cip_love_letter: received ll, but no cip_infoThe following line indicates that data was received on the CIP:
Channel3/1: love letter received, bytes 3308The following line indicates that the interface is enabled, but there is no configuration for it. It does notnormally indicate a problem, just that the Route Processor (RP) got statistics from the CIP but has no placeto store them.
cip_love_letter: received ll, but no cip_info
Related Commands DescriptionCommand
Displays processing that occurs on the channel adapterinterfaces of all installed adapters.
debug channel events
Displays per-packet debugging output.debug channel packets
Cisco IOS Debug Command Reference - Commands A through D 381
debug backhaul-session-manager session through debug channel packetsdebug channel love
debug channel packetsTo display per-packet debugging output, use the debugchannelpackets command in privileged EXECmode.To disable debugging output, use the no form of this command.
debug channel packets
no debug channel packets
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines The debugchannelpackets command displays all process-level Channel Interface Processor ( CIP) packetsfor both outbound and inbound packets. The output reports information when a packet is received or atransmission is attempted. You will need to disable fast switching and autonomous switching to obtaindebugging output. This command is useful for determining whether packets are received or sent correctly.
This command is valid for the Cisco 7000 series routers only.
Examples The following is sample output from thedebugchannelpackets command:
Router# debug channel packets
(Channel3/0)-out size = 104, vc = 0000, type = 0800, src 172.24.0.11, dst 172.24.1.58(Channel3/0)-in size = 48, vc = 0000, type = 0800, src 172.24.1.58, dst 172.24.15.197(Channel3/0)-in size = 48, vc = 0000, type = 0800, src 172.24.1.58, dst 172.24.15.197(Channel3/0)-out size = 71, vc = 0000, type = 0800, src 172.24.15.197, dst 172.24.1.58(Channel3/0)-in size = 44, vc = 0000, type = 0800, src 172.24.1.58, dst 172.24.15.197The table below describes the significant fields shown in the display.
Table 54: debug channel packets Field Descriptions
DescriptionField
Interface slot and port.(Channel3/0)
"In" is a packet from the mainframe to the router.
"Out" is a packet from the router to the mainframe.
in/out
Number of bytes in the packet, including internaloverhead.
size =
Value from 0 to 511 that maps to the claw interfaceconfiguration command. This information is from theMAC layer.
vc =
Cisco IOS Debug Command Reference - Commands A through D382
debug backhaul-session-manager session through debug channel packetsdebug channel packets
DescriptionField
Encapsulation type in theMAC layer. The value 0800indicates an IP datagram.
type =
Origin, or source, of the packet, as opposed to theprevious hop address.
src
Destination of the packet, as opposed to the next-hopaddress.
dst
Cisco IOS Debug Command Reference - Commands A through D 383
debug backhaul-session-manager session through debug channel packetsdebug channel packets
Cisco IOS Debug Command Reference - Commands A through D384
debug backhaul-session-manager session through debug channel packetsdebug channel packets
debug clns esis events through debug dbconntcp
• debug clns esis events through debug dbconn tcp, page 385
debug clns esis events through debug dbconn tcp
Cisco IOS Debug Command Reference - Commands A through D 385
debug clns esis eventsTo display uncommon End System-to-Intermediate System (ES-IS) events, including previously unknownneighbors, neighbors that have aged out, and neighbors that have changed roles (ES-IS, for example), use thedebugclnsesisevents command in privileged EXEC mode. To disable debugging output, use the no form ofthis command.
debug clns esis events
no debug clns esis events
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Examples The following is sample output from the debugclnsesisevents command:
Router# debug clns esis eventsES-IS: ISH from aa00.0400.2c05 (Ethernet1), HT 30ES-IS: ESH from aa00.0400.9105 (Ethernet1), HT 150ES-IS: ISH sent to All ESs (Ethernet1): NET 49.0001.AA00.0400.6904.00, HT 299, HLEN 20The following line indicates that the router received a hello packet ( ISH) from the IS at MAC addressaa00.0400.2c05 on Ethernet interface 1. The hold time (or number of seconds to consider this packet validbefore deleting it) for this packet is 30 seconds.
ES-IS: ISH from aa00.0400.2c05 (Ethernet1), HT 30The following line indicates that the router received a hello packet (ESH) from the ES at MAC addressaa00.0400.9105 on the Ethernet interface 1. The hold time is 150 seconds.
ES-IS: ESH from aa00.0400.9105 (Ethernet1), HT 150The following line indicates that the router sent an IS hello packet on the Ethernet interface 0 to all ESs onthe network. The network entity title (NET) address of the router is 49.0001.0400.AA00.6904.00; the holdtime for this packet is 299 seconds; and the header length of this packet is 20 bytes.
ES-IS: ISH sent to All ESs (Ethernet1): NET 49.0001.AA00.0400.6904.00, HT 299, HLEN 20
Cisco IOS Debug Command Reference - Commands A through D386
debug clns esis events through debug dbconn tcpdebug clns esis events
debug clns esis packetsTo enable display information on End System-to-Intermediate System ( ES-IS) packets that the router hasreceived and sent, use the debugclnsesispackets command in privileged EXEC mode. To disable debuggingoutput, use the no form of this command.
debug clns esis packets
no debug clns esis packets
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Examples The following is sample output from thedebugclnsesispackets command:
Router# debug clns esis packets
ES-IS: ISH sent to All ESs (Ethernet0): NET47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00, HT 299, HLEN 33ES-IS: ISH sent to All ESs (Ethernet1): NET47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00, HT 299, HLEN 34ES-IS: ISH from aa00.0400.6408 (Ethernet0), HT 299ES-IS: ISH sent to All ESs (Tunnel0): NET47.0005.80ff.ef00.0000.0001.5940.1600.O906.4023.00, HT 299, HLEN 34IS-IS: ESH from 0000.0c00.bda8 (Ethernet0), HT 300The following line indicates that the router has sent an IS hello packet on Ethernet interface 0 to all ESs onthe network. This hello packet indicates that the NET of the router is47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00. The hold time for this packet is 299 seconds. Thepacket header is 33 bytes in length.
ES-IS: ISH sent to All ESs (Ethernet0): NET47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00, HT 299, HLEN 33The following line indicates that the router has sent an IS hello packet on Ethernet interface 1 to all ESs onthe network. This hello packet indicates that the NET of the router is47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00. The hold time for this packet is 299 seconds. Thepacket header is 33 bytes in length.
ES-IS: ISH sent to All ESs (Ethernet1): NET47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00, HT 299, HLEN 34The following line indicates that the router received a hello packet on Ethernet interface 0 from an intermediatesystem, aa00.0400.6408. The hold time for this packet is 299 seconds.
ES-IS: ISH from aa00.0400.6408 (Ethernet0), HT 299The following line indicates that the router has sent an IS hello packet on Tunnel interface 0 to all ESs on thenetwork. This hello packet indicates that the NET of the router is47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00. The hold time for this packet is 299 seconds. Thepacket header is 33 bytes in length.
ES-IS: ISH sent to All ESs (Tunnel0): NET 47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00,HT 299, HLEN 34
Cisco IOS Debug Command Reference - Commands A through D 387
debug clns esis events through debug dbconn tcpdebug clns esis packets
The following line indicates that on Ethernet interface 0, the router received a hello packet from an end systemwith an SNPA of 0000.0c00.bda8. The hold time for this packet is 300 seconds.
IS-IS: ESH from 0000.0c00.bda8 (Ethernet0), HT 300
Cisco IOS Debug Command Reference - Commands A through D388
debug clns esis events through debug dbconn tcpdebug clns esis packets
debug clns eventsTo display Connectionless Network Service (CLNS) events that are occurring at the router, use thedebugclnsevents command in privileged EXEC mode. To disable debugging output, use the no form of thiscommand.
debug clns events
no debug clns events
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Examples The following is sample output from thedebugclnsevents command:
Router# debug clns eventsCLNS: Echo PDU received on Ethernet3 from 39.0001.2222.2222.2222.00!CLNS: Sending from 39.0001.3333.3333.3333.00 to 39.0001.2222.2222.2222.00
via 2222.2222.2222 (Ethernet3 0000.0c00.3a18)CLNS: Forwarding packet size 117
from 39.0001.2222.2222.2222.00to 49.0002.0001.AAAA.AAAA.AAAA.00via 49.0002 (Ethernet3 0000.0c00.b5a3)
CLNS: RD Sent on Ethernet3 to 39.0001.2222.2222.2222.00 @ 0000.0c00.3a18,redirecting 49.0002.0001.AAAA.AAAA.AAAA.00 to 0000.0c00.b5a3
The following line indicates that the router received an echo protocol data unit (PDU) on Ethernet interface3 from source network service access point (NSAP) 39.0001.2222.2222.2222.00. The exclamation point atthe end of the line has no significance.
CLNS: Echo PDU received on Ethernet3 from 39.0001.2222.2222.2222.00!The following lines indicate that the router at source NSAP 39.0001.3333.3333.3333.00 is sending a CLNSecho packet to destination NSAP 39.0001.2222.2222.2222.00 via an IS with system ID 2222.2222.2222. Thepacket is being sent on Ethernet interface 3, with a MAC address of 0000.0c00.3a18.
CLNS: Sending from 39.0001.3333.3333.3333.00 to 39.0001.2222.2222.2222.00via 2222.2222.2222 (Ethernet3 0000.0c00.3a18)
The following lines indicate that a CLNS echo packet 117 bytes in size is being sent from source NSAP39.0001.2222.2222.2222.00 to destination NSAP 49.0002.0001.AAAA.AAAA.AAAA.00 via the router atNSAP 49.0002. The packet is being forwarded on the Ethernet interface 3, with a MAC address of0000.0c00.b5a3.
CLNS: Forwarding packet size 117from 39.0001.2222.2222.2222.00to 49.0002.0001.AAAA.AAAA.AAAA.00via 49.0002 (Ethernet3 0000.0c00.b5a3)
The following lines indicate that the router sent a redirect packet on the Ethernet interface 3 to the NSAP39.0001.2222.2222.2222.00 at MAC address 0000.0c00.3a18 to indicate that NSAP49.0002.0001.AAAA.AAAA.AAAA.00 can be reached at MAC address 0000.0c00.b5a3.
CLNS: RD Sent on Ethernet3 to 39.0001.2222.2222.2222.00 @ 0000.0c00.3a18,redirecting 49.0002.0001.AAAA.AAAA.AAAA.00 to 0000.0c00.b5a3
Cisco IOS Debug Command Reference - Commands A through D 389
debug clns esis events through debug dbconn tcpdebug clns events
debug clns igrp packetsTo display debugging information on all ISO-IGRP routing activity, use the debugclnsigrppackets privilegedEXEC command. The no form of this command disables debugging output.
debug clns igrp packets
no debug clns igrp packets
Syntax Description This command has no arguments or keywords.
Command History ModificationRelease
This command was introduced.10.0
This command is no longer supported in Cisco IOS Mainline orTechnology-based (T) releases. It may continue to appear in Cisco IOS12.2S-family releases.
12.2(13)T
Examples The following is sample output from thedebugclnsigrppackets command:
Router# debug clns igrp packetsISO-IGRP: Hello sent on Ethernet3 for DOMAIN_green1ISO-IGRP: Received hello from 39.0001.3333.3333.3333.00, (Ethernet3), ht 51ISO-IGRP: Originating level 1 periodic updateISO-IGRP: Advertise dest: 2222.2222.2222ISO-IGRP: Sending update on interface: Ethernet3ISO-IGRP: Originating level 2 periodic updateISO-IGRP: Advertise dest: 0001ISO-IGRP: Sending update on interface: Ethernet3ISO-IGRP: Received update from 3333.3333.3333 (Ethernet3)ISO-IGRP: Opcode: areaISO-IGRP: Received level 2 adv for 0001 metric 1100ISO-IGRP: Opcode: stationISO-IGRP: Received level 1 adv for 3333.3333.3333 metric 1100The following line indicates that the router is sending a hello packet to advertise its existence in theDOMAIN_green1 domain:
ISO-IGRP: Hello sent on Ethernet3 for DOMAIN_green1The following line indicates that the router received a hello packet from a certain network service access point(NSAP) on Ethernet interface 3. The hold time for this information is 51 seconds.
ISO-IGRP: Received hello from 39.0001.3333.3333.3333.00, (Ethernet3), ht 51The following lines indicate that the router is generating a Level 1 update to advertise reachability to destinationNSAP 2222.2222.2222 and that it is sending that update to all systems that can be reached through Ethernetinterface 3:
ISO-IGRP: Originating level 1 periodic updateISO-IGRP: Advertise dest: 2222.2222.2222ISO-IGRP: Sending update on interface: Ethernet3
Cisco IOS Debug Command Reference - Commands A through D390
debug clns esis events through debug dbconn tcpdebug clns igrp packets
The following lines indicate that the router is generating a Level 2 update to advertise reachability to destinationarea 1 and that it is sending that update to all systems that can be reached through Ethernet interface 3:
ISO-IGRP: Originating level 2 periodic updateISO-IGRP: Advertise dest: 0001ISO-IGRP: Sending update on interface: Ethernet3The following lines indicate that the router received an update from NSAP 3333.3333.3333 on Ethernetinterface 3. This update indicated the area that the router at this NSAP could reach.
ISO-IGRP: Received update from 3333.3333.3333 (Ethernet3)ISO-IGRP: Opcode: areaThe following lines indicate that the router received an update advertising that the source of that update canreach area 1 with a metric of 1100. A station opcode indicates that the update included system addresses.
ISO-IGRP: Received level 2 adv for 0001 metric 1100ISO-IGRP: Opcode: station
Cisco IOS Debug Command Reference - Commands A through D 391
debug clns esis events through debug dbconn tcpdebug clns igrp packets
debug clns packetTo display information about packet receipt and forwarding to the next interface, use the debugclnspacketcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug clns packet
no debug clns packet
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Examples The following is sample output from thedebugclnspacket command:
Router# debug clns packetCLNS: Forwarding packet size 157
from 47.0023.0001.0000.0000.0003.0001.1920.3614.3002.00 STUPI-RBSto 47.0005.80ff.ef00.0000.0001.5940.1600.8906.4017.00via 1600.8906.4017 (Ethernet0 0000.0c00.bda8)
CLNS: Echo PDU received on Ethernet0 from47.0005.80ff.ef00.0000.0001.5940.1600.8906.4017.00!CLNS: Sending from 47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00 to
47.0005.80ff.ef00.0000.0001.5940.1600.8906.4017.00via 1600.8906.4017 (Ethernet0 0000.0c00.bda8)
In the following lines, the first line indicates that a Connectionless Network Service (CLNS) packet of size157 bytes is being forwarded. The second line indicates the network service access point ( NSAP) and systemname of the source of the packet. The third line indicates the destination NSAP for this packet. The fourthline indicates the next hop system ID, interface, and subnetwork point of attachment (SNPA) of the routerinterface used to forward this packet.
CLNS: Forwarding packet size 157from 47.0023.0001.0000.0000.0003.0001.1920.3614.3002.00 STUPI-RBSto 47.0005.80ff.ef00.0000.0001.5940.1600.8906.4017.00via 1600.8906.4017 (Ethernet0 0000.0c00.bda8)
In the following lines, the first line indicates that the router received an echo protocol data unit (PDU) on thespecified interface from the source NSAP. The second line indicates which source NSAP is used to send aCLNS packet to the destination NSAP, as shown on the third line. The fourth line indicates the next hopsystem ID, interface, and SNPA of the router interface used to forward this packet.
CLNS: Echo PDU received on Ethernet0 from47.0005.80ff.ef00.0000.0001.5940.1600.8906.4017.00!CLNS: Sending from 47.0005.80ff.ef00.0000.0001.5940.1600.8906.4023.00 to47.0005.80ff.ef00.0000.0001.5940.1600.8906.4017.00
via 1600.8906.4017 (Ethernet0 0000.0c00.bda8)
Cisco IOS Debug Command Reference - Commands A through D392
debug clns esis events through debug dbconn tcpdebug clns packet
debug clns routingTo display debugging information for all Connectionless Network Service (CLNS) routing cache updates andactivities involving the CLNS routing table, use the debugclnsrouting command in privileged EXEC mode.To disable debugging output, use the no form of this command.
debug clns routing
no debug clns routing
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Examples The following is sample output from the debugclnsrouting command:
Router# debug clns routingCLNS-RT: cache increment:17CLNS-RT: Add 47.0023.0001.0000.0000.0003.0001 to prefix table, next hop 1920.3614.3002CLNS-RT: Aging cache entry for: 47.0023.0001.0000.0000.0003.0001.1920.3614.3002.06CLNS-RT: Deleting cache entry for: 47.0023.0001.0000.0000.0003.0001.1920.3614.3002.06The following line indicates that a change to the routing table has resulted in an addition to the fast-switchingcache:
CLNS-RT: cache increment:17The following line indicates that a specific prefix route was added to the routing table, and indicates the nexthop system ID to that prefix route. In other words, when the router receives a packet with the prefix47.0023.0001.0000.0000.0003.0001 in the destination address of that packet, it forwards that packet to therouter with the MAC address 1920.3614.3002.
CLNS-RT: Add 47.0023.0001.0000.0000.0003.0001 to prefix table, next hop 1920.3614.3002The following lines indicate that the fast-switching cache entry for a certain network service access point(NSAP) has been invalidated and then deleted:
CLNS-RT: Aging cache entry for: 47.0023.0001.0000.0000.0003.0001.1920.3614.3002.06CLNS-RT: Deleting cache entry for: 47.0023.0001.0000.0000.0003.0001.1920.3614.3002.06
Cisco IOS Debug Command Reference - Commands A through D 393
debug clns esis events through debug dbconn tcpdebug clns routing
debug cls messageTo display information about Cisco Link Services (CLS) messages, use the debugclsmessagecommand inprivileged EXEC mode. To disable debugging output, use the no form of this command.
debug cls message
no debug cls message
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines The debugclsmessagecommand displays the primitives (state), selector, header length, and data size.
Examples The following is sample output from thedebugclsmessagecommand. For example, CLS-->DLU indicates thedirection of the flow that is described by the status. From CLS to dependent logical unit (DLU), a request wasestablished to the connection endpoint. The header length is 48 bytes, and the data size is 104 bytes.
Router# debug cls message(FRAS Daemon:CLS-->DLU):
ID_STN.Ind to uSAP: 0x607044C4 sel: LLC hlen: 40, dlen: 54(FRAS Daemon:CLS-->DLU):
ID_STN.Ind to uSAP: 0x6071B054 sel: LLC hlen: 40, dlen: 46(FRAS Daemon:DLU-->SAP):
REQ_OPNSTN.Req to pSAP: 0x608021F4 sel: LLC hlen: 48, dlen: 104(FRAS Daemon:CLS-->DLU):
REQ_OPNSTN.Cfm(NO_REMOTE_STN) to uCEP: 0x607FFE84 sel: LLC hlen: 48, dlen: 104The status possibilities include the following: enabled, disabled, request open station, open station, closestation, activate SA, deactivate service access point (SAP), XID, exchange identification (XID) station, connectstation, signal station, connect, disconnect, connected, data, flow, unnumbered data, modify SAP, test, activatering, deactivate ring, test station, and unnumbered data station.
Related Commands DescriptionCommand
Displays information about FRAS protocol errors.debug fras error
Displays general information about FRASmessages.debug fras message
Displays information about FRAS data-link controlstate changes.
debug fras state
Cisco IOS Debug Command Reference - Commands A through D394
debug clns esis events through debug dbconn tcpdebug cls message
debug cls vdlcTo display information about Cisco Link Services (CLS) Virtual Data Link Control (VDLC), use thedebugclsvdlccommand in privileged EXEC mode. To disable debugging output, use the no form of thiscommand.
debug cls vdlc
no debug cls vdlc
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines The debugclsmessage command displays primitive state transitions, selector, and source and destinationMAC and service access points (SAPs).
Also use the showcls command to display additional information on CLS VDLC.
Use the debugclsvdlc command with caution because it can generate a substantial amount of output.Caution
Examples The following messages are sample output from the debugclsvdlc command. In the following scenario, thesystems network architecture (SNA) service point--also called nativeservicepoint(NSP)--is setting up twoconnections through VDLC and data-link switching (DLSw): one from NSP to VDLC and one from DLSwto VDLC. VDLC joins the two.
The NSP initiates a connection from 4000.05d2.0001 as follows:
VDLC: Req Open Stn Req PSap 0x7ACE00, port 0x79DF984000.05d2.0001(0C)->4000.1060.1000(04)In the next message, VDLC sends a test station request to DLSw for destination address 4000.1060.1000.
VDLC: Send UFrame E3: 4000.05d2.0001(0C)->4000.1060.1000(00)In the next two messages, DLSw replies with test station response, and NSP goes to a half-open state. NSPis waiting for the DLSw connection to VDLC.
VDLC: Sap to Sap TEST_STN_RSP VSap 0x7B68C0 4000.1060.1000(00)->4000.05d2.0001(0C)VDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_OPENING->VDLC_HALF_OPENThe NSP sends an exchange identification (XID) and changes state as follows:
VDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_HALF_OPEN->VDLC_XID_RSP_PENDINGVDLC: CEP to SAP ID_REQ 4000.05d2.0001(0C)->4000.1060.1000(04) via bridging SAP (DLSw)In the next several messages, DLSw initiates its connection, which matches the half-open connection withNSP:
VDLC: Req Open Stn Req PSap 0x7B68C0, port 0x7992A04000.1060.1000(04)->4000.05d2.0001(0C)
Cisco IOS Debug Command Reference - Commands A through D 395
debug clns esis events through debug dbconn tcpdebug cls vdlc
VDLC: two-way connection establishedVDLC: 4000.1060.1000(04)->4000.05d2.0001(0C): VDLC_IDLE->VDLC_OPENIn the following messages, DLSw sends an XID response, and the NSP connection goes from the state XIDResponse Pending to Open. The XID exchange follows:
VDLC: CEP to CEP ID_RSP 4000.1060.1000(04)->4000.05d2.0001(0C)VDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_XID_RSP_PENDING->VDLC_OPENVDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_OPEN->VDLC_XID_RSP_PENDINGVDLC: CEP to CEP ID_REQ 4000.05d2.0001(0C)->4000.1060.1000(04)VDLC: CEP to CEP ID_RSP 4000.1060.1000(04)->4000.05d2.0001(0C)VDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_XID_RSP_PENDING->VDLC_OPENVDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_OPEN->VDLC_XID_RSP_PENDINGVDLC: CEP to CEP ID_REQ 4000.05d2.0001(0C)->4000.1060.1000(04)VDLC: CEP to CEP ID_RSP 4000.1060.1000(04)->4000.05d2.0001(0C)VDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_XID_RSP_PENDING->VDLC_OPENVDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_OPEN->VDLC_XID_RSP_PENDINGVDLC: CEP to CEP ID_REQ 4000.05d2.0001(0C)->4000.1060.1000(04)VDLC: CEP to CEP ID_RSP 4000.1060.1000(04)->4000.05d2.0001(0C)VDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_XID_RSP_PENDING->VDLC_OPENVDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_OPEN->VDLC_XID_RSP_PENDINGVDLC: CEP to CEP ID_REQ 4000.05d2.0001(0C)->4000.1060.1000(04)When DLSw is ready to connect, the front-end processor (FEP) sends a set asynchronous balanced modeextended (SABME) command as follows:
VDLC: CEP to CEP CONNECT_REQ 4000.1060.1000(04)->4000.05d2.0001(0C)VDLC: 4000.05d2.0001(0C)->4000.1060.1000(04): VDLC_XID_RSP_PENDING->VDLC_OPENIn the following messages, NSP accepts the connection and sends an unnumbered acknowledgment (UA) tothe FEP:
VDLC: CEP to CEP CONNECT_RSP 4000.05d2.0001(0C)->4000.1060.1000(04)VDLC: FlowReq QUENCH OFF 4000.1060.1000(04)->4000.05d2.0001(0C)The following messages show the data flow:
VDLC: DATA 4000.1060.1000(04)->4000.05d2.0001(0C)VDLC: DATA 4000.05d2.0001(0C)->4000.1060.1000(04)...VDLC: DATA 4000.1060.1000(04)->4000.05d2.0001(0C)VDLC: DATA 4000.05d2.0001(0C)->4000.1060.1000(04)
Related Commands DescriptionCommand
Displays information about CLS messages.debug cls message
Cisco IOS Debug Command Reference - Commands A through D396
debug clns esis events through debug dbconn tcpdebug cls vdlc
debug cme-xmlTo generate debug messages for the Cisco Unified CallManager Express XML application, use thedebugcme-xml command in privileged EXECmode. To disable debugging, use the no form of the command.
debug cme-xml
no debug cme-xml
Syntax Description This command has no keywords or arguments.
Command Modes Privileged EXEC
Command History ModificationCisco IOS Release
This command was introduced.12.4(4)XC
This command was integrated into Cisco IOS Release 12.4(9)T.12.4(9)T
Usage Guidelines The showfb-its-log command displays the contents of the XML event table.
Examples The following example shows the progress of an XML request that has been sent to Cisco Unified CallManagerExpress:
Router# debug cme-xml*Aug 5 06:27:25.727: CME got a raw XML message.*Aug 5 06:27:25.727: doc 0x63DB85E8, doc->doc_type 3, req 0x655FDCD0*Aug 5 06:27:25.727: CME extracted a XML document*Aug 5 06:27:25.727: Response buffer 0x63DCFD58, len = 4096*Aug 5 06:27:25.727: First Tag ID SOAP_HEADER_TAG_ID 58720257*Aug 5 06:27:25.727: First Attribute ID SOAP_ENV_ATTR 50331649*Aug 5 06:27:25.727: cme_xml_process_soap_header*Aug 5 06:27:25.727: cme_xml_process_soap_body*Aug 5 06:27:25.731: cme_xml_process_axl*Aug 5 06:27:25.731: cme_xml_process_request*Aug 5 06:27:25.731: cme_xml_process_ISgetGlobal*Aug 5 06:27:25.731: CME XML sent 811 bytes response.
Related Commands DescriptionCommand
Displays Cisco Unified CallManager Express XMLAPI information.
show fb-its-log
Cisco IOS Debug Command Reference - Commands A through D 397
debug clns esis events through debug dbconn tcpdebug cme-xml
debug cns configTo turn on debugging messages related to the Cisco Networking Services (CNS) configuration agent, use thedebugcnsconfig command in privileged EXEC mode. To disable debugging output, use the no form of thiscommand.
debug cns config {agent| all| connection| notify}
no debug cns config {agent| all| connection| notify}
Syntax Description Displays debugging messages related to the CNSconfiguration agent.
agent
Displays all debugging messages.all
Displays debuggingmessages related to configurationconnections.
connection
Displays debugging messages related to CNSconfigurations.
notify
Command Default No default behavior or values
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(2)T
This command was integrated into Cisco IOS Release 12.0(18)ST.12.0(18)ST
This command was implemented on the Cisco 2600 and Cisco 3600series.
12.2(8)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SB.12.2(33)SB
This command was integrated into Cisco IOS Release 12.2(33)SXI.12.2(33)SXI
Usage Guidelines Use this command to turn on or turn off debugging messages related to the CNS Configuration Agent.
Cisco IOS Debug Command Reference - Commands A through D398
debug clns esis events through debug dbconn tcpdebug cns config
Examples In the following example, debugging messages are enabled for CNS configuration processes:
Router# debug cns config all
00:04:09: config_id_get: entered00:04:09: config_id_get: Invoking cns_id_mode_get()00:04:09: config_id_get: cns_id_mode_get() returned INTERNAL00:04:09: config_id_get: successful exit cns_config_id=minna1,cns_config_id_len=600:04:09: cns_establish_connect_intf(): The device is already connected with the configserver00:04:09: cns_initial_config_agent(): connecting with port 8000:04:09: pull_config() entered00:04:09: cns_config_id(): returning config_id=minna100:04:09: Message finished 150 readend00:04:09: %CNS-4-NOTE: SUCCESSFUL_COMPLETION-Process= "CNS Initial Configuration Agent", ipl= 0, pid= 8200:04:10: %SYS-5-CONFIG_I: Configured from console by console
Related Commands DescriptionCommand
Cancels a CNS configuration.cns config cancel
Starts the initial CNS Configuration Agent.cns config initial
Starts the partial CNS Configuration Agent.cns config partial
Gets the configuration of a routing device using CNS.cns config retrieve
Displays information on CNS events.debug cns event
Displays information on CNS management.debug cns exec
Displays information on the CNS XML parser.debug cns xml-parser
Displays information about the CNS ConfigurationAgent.
show cns config
Cisco IOS Debug Command Reference - Commands A through D 399
debug clns esis events through debug dbconn tcpdebug cns config
debug cns eventsTo turn on debugging messages related to the Cisco Networking Services (CNS) Event Gateway, use thedebugcnsevent command in privileged EXEC mode. To disable debugging output, use the no form of thiscommand.
debug cns event {agent| all| connection| subscriber}
no debug cns event {agent| all| connection| subscriber}
Syntax Description Displays debugging messages related to the event agent.agent
Displays all debugging messages.all
Displays debugging messages related to event connections.connection
Displays debugging messages related to subscribers.subscriber
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(2)T
This command was integrated into the Cisco IOS Release 12.0(18)ST.12.0(18)ST
This command was implemented on Cisco 2600 series and Cisco 3600series routers.
12.2(8)T
This command was integrated into Cisco IOS Release 12.2(31)SB2.12.2(31)SB2
Usage Guidelines Use this command to turn on or turn off debugging messages related to the CNS Event Gateway.
Examples In the following example, debugging messages about all CNS Events are enabled:
Router# debug cns event all
00:09:14: %CNS-4-NOTE: SUCCESSFUL_COMPLETION-Process= "CNS Initial Configuration Agent", ipl= 0, pid= 8200:09:14: event_agent():event_agent starting ..
Cisco IOS Debug Command Reference - Commands A through D400
debug clns esis events through debug dbconn tcpdebug cns events
00:09:14: event_agent_open_connection(): attempting socket connect to Primary Gateway00:09:14: event_agent_open_connection():cns_socket_connect() succeeded:return_code=000:09:14: event_agent_open_connection():timeout_len=1:ka_total_timeout =0:
total_timeout=000:09:14: event_id_get: entered00:09:14: event_id_get: Invoking cns_id_mode_get()00:09:14: event_id_get: cns_id_mode_get() returned INTERNAL00:09:14: event_id_get: successful exit cns_event_id=test1, cns_event_id_len=500:09:14: ea_devid_send(): devid sent DUMP OF DEVID MSG82C920A0: 00120000 00010774 .......t82C920B0: 65737431 00000402 020000 est1.......00:09:14: event_agent_get_input(): cli timeout=0: socket:0x000:09:14: process_all_event_agent_event_items():process_get_wakeup(&major, &minor)=TRUE:major=0...00:09:14: add_subjectANDhandle_to_subject_table():p_subject_entry=0x82E3EEDC:p_subject_entry_list=0x82619CD800:09:14: add_subjectANDhandle_to_subject_table():add 'user_entry' entry succeeded:user entry =0x82C92AF4:queue_handle=0x82C913FC00:09:14: %SYS-5-CONFIG_I: Configured from console by console
Related Commands DescriptionCommand
Configures the CNS Event Gateway.cns event
Displays information about the CNS Event Agent.show cns event
Cisco IOS Debug Command Reference - Commands A through D 401
debug clns esis events through debug dbconn tcpdebug cns events
debug cns execTo display debugging messages about Cisco Networking Services (CNS) exec agent services, use thedebugcnsexec command in privileged EXEC mode. To disable debugging output, use the no or undebugform of this command.
debug cns exec {agent| all| decode| messages}
no debug cns exec {agent| all| decode| messages}
undebug cns exec {agent| all| decode| messages}
Syntax Description Displays debugging messages related to the execagent.
agent
Displays all debugging messages.all
Displays debugging messages related to image agentconnections.
decode
Displays debugging output related to messagesgenerated by exec agent services.
messages
Command Default Debugging output is disabled.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.3(1)
This command was integrated into Cisco IOS Release 12.2(25)S.12.2(25)S
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(33)SB.12.2(33)SB
This command was integrated into Cisco IOS Release 12.2(33)SXI.12.2(33)SXI
Usage Guidelines Use the debug cns exec command to troubleshoot CNS exec agent services.
Cisco IOS Debug Command Reference - Commands A through D402
debug clns esis events through debug dbconn tcpdebug cns exec
Examples The following example shows a debugging message for the CNS exec agent when a response has been postedto HTTP:
Router# debug cns exec agent
4d20h: CNS exec agent: response posted
Related Commands DescriptionCommand
Configures CNS Exec Agent services.cns exec
Cisco IOS Debug Command Reference - Commands A through D 403
debug clns esis events through debug dbconn tcpdebug cns exec
debug cns imageTo display debugging messages about Cisco Networking Services (CNS) image agent services, use the debugcns image command in privileged EXECmode. To disable debugging output, use the no form of this command.
debug cns image {agent| all| connection| error}
no debug cns image {agent| all| connection| error}
Syntax Description Displays debugging messages related to the imageagent.
agent
Displays all debugging messages.all
Displays debugging messages related to image agentconnections.
connection
Displays debugging messages related to errorsgenerated by image agent services.
error
Command Default If no keyword is specified, all debugging messages are displayed.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.3(1)
This command was integrated into Cisco IOS Release 12.2(31)SB2.12.2(31)SB2
This command was integrated into Cisco IOS Release 12.2(33)SRB.12.2(33)SRB
This command was integrated into Cisco IOS Release 12.2(33)SB.12.2(33)SB
This command was integrated into Cisco IOS Release 12.2(33)SXI.12.2(33)SXI
Usage Guidelines Use the debug cns image command to troubleshoot CNS image agent services.
Cisco IOS Debug Command Reference - Commands A through D404
debug clns esis events through debug dbconn tcpdebug cns image
debug cns managementTo display information about Cisco Networking Services (CNS)management, use the debug cnsmanagementcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug cns management {snmp| xml}
no debug cns management {snmp| xml}
Syntax Description Displays debugging messages related to nongranularSimple Network Management Protocol (SNMP)encapsulated CNS-management events.
snmp
Displays debugging messages related to granulareXtensible Markup Language (XML) encapsulatedCNS-management events.
xml
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(8)T
Examples In the following example, debugging messages about SNMP- and XML-encapsulated CNS-managementevents are enabled:
Router# debug cns management snmpRouter# debug cns management xmlRouter# show debugging
CNS Management (SNMP Encapsulation) debugging is onCNS Management (Encap XML) debugging is onRouter# show running-config | include cns
cns mib-access encapsulation snmpcns mib-access encapsulation xmlcns notifications encapsulation snmpcns notifications encapsulation xmlcns event 10.1.1.1 11011Router#00:12:50: Enqueued a notification in notif_q00:12:50: ea_produce succeeded Subject:cisco.cns.mibaccess:notification Message Length:385
00:12:50: Trap sent via CNS Transport Mapping.Router#00:13:31: Response sent via CNS Transport Mapping.Router#00:14:38: Received a request00:14:38: ea_produce succeeded Subject:cisco.cns.mibaccess:response Message Length:241
Cisco IOS Debug Command Reference - Commands A through D 405
debug clns esis events through debug dbconn tcpdebug cns management
Related Commands DescriptionCommand
Configures the CNS event gateway, which providesCNS event services to Cisco IOS clients.
cns event
Displays information on CNS configurations.debug cns config
Displays information on the CNS XML parser.debug cns xml-parser
Displays information about the types of debuggingthat are enabled for your router.
show debugging
Displays the current running configuration.show running-config
Cisco IOS Debug Command Reference - Commands A through D406
debug clns esis events through debug dbconn tcpdebug cns management
debug cns xmlTo turn on debugging messages related to the Cisco Networking Services (CNS) eXtensibleMarkup Language(XML) parser, use the debugcnsxml command in privileged EXEC mode. To disable debugging output, usethe no form of this command.
debug cns xml {all| decode| dom| parser}
no debug cns xml {all| decode| dom| parser}
Syntax Description Displays all CNS debugging.all
Reports usage of common XML decoding libraryfunctions by applications and reports the decodedcontents.
decode
Displays failures in the Document Object Model(DOM) infrastructuremessages tree built by the XMLparser.
dom
Displays failures and progress of the parsing of anXML message by the XML parser.
parser
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced. This command replaces thedebugcnsxml-parser command.
12.3(2)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
This command is supported in the Cisco IOS Release 12.2SX train. Supportin a specific 12.2SX release of this train depends on your feature set, platform,and platform hardware.
12.2SX
This command was integrated into Cisco IOS Release 12.2(33)SB.12.2(33)SB
This command was integrated into Cisco IOS Release 12.2(33)SXI.12.2(33)SXI
Examples In the following example, debugging messages for the CNS XML parser are enabled:
Router# debug cns xml parser
Cisco IOS Debug Command Reference - Commands A through D 407
debug clns esis events through debug dbconn tcpdebug cns xml
00:12:05: Registering tag <config-server>00:12:05: Registering tag <server-info>00:12:05: Registering tag <ip-address>00:12:05: Registering tag <web-page>00:12:05: Registering tag <config-event>00:12:05: Registering tag <identifier>00:12:05: Registering tag <config-id>00:12:05: Registering tag <config-data>00:12:05: Registering tag <cli>00:12:05: Registering tag <error-info>00:12:05: Registering tag <error-message>00:12:05: Registering tag <line-number>00:12:05: Registering tag <config-write>00:12:05: Registering tag <exec-cmd-event>00:12:05: Registering tag <identifier-exec>00:12:05: Registering tag <event-response>00:12:05: Registering tag <reply-subject>00:12:05: Registering tag <server-response>00:12:05: Registering tag <ip-address-exec>00:12:05: Registering tag <port-number>00:12:05: Registering tag <url>00:12:05: Registering tag <cli-exec>00:12:05: Registering tag <config-pwd>00:12:06: Pushing tag <config-data> on to stack00:12:06: open tag is <config-data>00:12:06: Pushing tag <config-id> on to stack00:12:06: open tag is <config-id>00:12:06: Popping tag <config-id> off stack00:12:06: close tag is </config-id>00:12:06: Pushing tag <cli> on to stack00:12:06: open tag is <cli>00:12:06: Popping tag <cli> off stack00:12:06: close tag is </cli>00:12:06: Popping tag <config-data> off stack00:12:06: close tag is </config-data>00:12:06: %CNS-4-NOTE: SUCCESSFUL_COMPLETION-Process= "CNS Initial Configuration Agent", ipl= 0, pid= 96
Related Commands DescriptionCommand
Configures the CNS Event Gateway.cns event
Displays information about the CNS Event Agent.show cns event
Cisco IOS Debug Command Reference - Commands A through D408
debug clns esis events through debug dbconn tcpdebug cns xml
debug cns xml-parser
Effective with Cisco IOS Release 12.3(2)T, the debug cns xml-parser command is replaced by the debugcns xml command. See the debug cns xml command for more information.
Note
To turn on debugging messages related to the Cisco Networking Services (CNS) eXtensibleMarkup Language(XML) parser, use the debug cns xml-parser command in privileged EXEC mode. To disable debuggingoutput, use the no form of this command.
debug cns xml-parser
no debug cns xml-parser
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(2)T
This command was integrated into Cisco IOS Release 12.0(18)ST.12.0(18)ST
This command was implemented on the Cisco 2600 and Cisco 3600series.
12.2(8)T
This command was replaced by the debug cns xml command.12.3(2)T
Examples In the following example, debugging messages for the CNS XML parser are enabled:
Router# debug cns xml-parser
00:12:05: Registering tag <config-server>00:12:05: Registering tag <server-info>00:12:05: Registering tag <ip-address>00:12:05: Registering tag <web-page>00:12:05: Registering tag <config-event>00:12:05: Registering tag <identifier>00:12:05: Registering tag <config-id>00:12:05: Registering tag <config-data>00:12:05: Registering tag <cli>00:12:05: Registering tag <error-info>00:12:05: Registering tag <error-message>00:12:05: Registering tag <line-number>00:12:05: Registering tag <config-write>00:12:05: Registering tag <exec-cmd-event>00:12:05: Registering tag <identifier-exec>00:12:05: Registering tag <event-response>
Cisco IOS Debug Command Reference - Commands A through D 409
debug clns esis events through debug dbconn tcpdebug cns xml-parser
00:12:05: Registering tag <reply-subject>00:12:05: Registering tag <server-response>00:12:05: Registering tag <ip-address-exec>00:12:05: Registering tag <port-number>00:12:05: Registering tag <url>00:12:05: Registering tag <cli-exec>00:12:05: Registering tag <config-pwd>00:12:06: Pushing tag <config-data> on to stack00:12:06: open tag is <config-data>00:12:06: Pushing tag <config-id> on to stack00:12:06: open tag is <config-id>00:12:06: Popping tag <config-id> off stack00:12:06: close tag is </config-id>00:12:06: Pushing tag <cli> on to stack00:12:06: open tag is <cli>00:12:06: Popping tag <cli> off stack00:12:06: close tag is </cli>00:12:06: Popping tag <config-data> off stack00:12:06: close tag is </config-data>00:12:06: %CNS-4-NOTE: SUCCESSFUL_COMPLETION-Process= "CNS Initial Configuration Agent", ipl= 0, pid= 96
Related Commands DescriptionCommand
Configures the CNS Event Gateway.cns event
Displays information about the CNS Event Agent.show cns event
Cisco IOS Debug Command Reference - Commands A through D410
debug clns esis events through debug dbconn tcpdebug cns xml-parser
debug compressTo debug compression, enter the debugcompresscommand in privileged EXEC mode. To disable debuggingoutput, use the no form of this command.
debug compress
no debug compress
Syntax Description This command has no arguments or keywords.
Command Default Disabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.10.0
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines Use this command to display output from the compression and decompression configuration you made. Livetraffic must be configured through the Cisco 2600 access router with a data compression Advanced InterfaceModule (AIM) installed for this command to work.
Examples The following example is output from the debugcompress command, which shows that compression is takingplace on a Cisco 2600 access router using data compression AIM hardware compression is configured correctly:
Router# debug compressCOMPRESS debugging is onRouter#compr-in:pak:0x810C6B10 npart:0 size:103pak:0x810C6B10 start:0x02406BD4 size:103 npart:0compr-out:pak:0x8118C8B8 stat:0x00000000 npart:1 size:71 lcb:0xEDpak:0x8118C8B8 start:0x0259CD3E size:71 npart:1
mp:0x8118A980 start:0x0259CD3E size:71decmp-in:pak:0x81128B78 start:0x0255AF44 size:42 npart:1 hdr:0xC035pak:0x81128B78 start:0x0255AF44 size:42 npart:1
mp:0x81174480 start:0x0255AF44 size:42decmp-out:pak:0x8118C8B8 start:0x025B2C42 size:55 npart:1 stat:0pak:0x8118C8B8 start:0x025B2C42 size:55 npart:1
mp:0x8118B700 start:0x025B2C42 size:55The table below describes the significant fields shown in the display.
Cisco IOS Debug Command Reference - Commands A through D 411
debug clns esis events through debug dbconn tcpdebug compress
Table 55: debug compress Field Descriptions
DescriptionField
Indicates that a packet needs to be compressed.compr-in
Indicates completion of compression of packet.compr-out
Indicates receipt of a compressed packet that needsto be decompressed.
decmp-in
Indicates completion of decompression of a packet.decmp-out
Provides the address in memory of a softwarestructure that describes the compressed packet.
pak:0x810C6B10
The "npart:0" indicates that the packet is containedin a single, contiguous area of memory. The startaddress of the packet is 0x02406bd4 and the size ofthe packet is 103.
start:0x02406BD4 size:103 npart:0
The "npart:1" indicates that the packet is containedin 1 or more regions of memory. The start address ofthe packet is 0x0259CD3E and the size of the packetis 71.
start:0x0259CD3E size:71 npart:1
Describes one of these regions of memory.mp:0x8118A980 start:0x0259CD3e size:71
Provides the address of a structure describing thisregion.
mp:0x8118A980
Provides the address of the start of this region.start 0x0259CD3E
Related Commands DescriptionCommand
Displays debugging information about the packetsthat are received on a Frame Relay interface.
debug frame-relay
Displays information on traffic and exchanges in aninternetwork implementing the PPP.
debug ppp
Displays compression statistics.show compress
Displays hardware information including DRAM,SRAM, and the revision-level information on the linecard.
show diag
Cisco IOS Debug Command Reference - Commands A through D412
debug clns esis events through debug dbconn tcpdebug compress
debug conditionTo filter debugging output for certain debug commands on the basis of specified conditions, use thedebugcondition command in privileged EXEC mode. To remove the specified condition, use the no form of thiscommand.
debug condition {called dial-string| caller dial-string| calling tidimsi string| domain domain-name| fexfabric-extender-numbermodule module-number| interface interface-id| ip ip-address|mac-addresshexadecimal-MAC-address|module module-number| portbundle ip ip-address bundle bundle-number|session-id session-number| switch switch-numbermodule module-number| username username| vcid vc-id|vlan vlan-id}
no debug condition {condition-id| all}
Syntax Description Filters output on the basis of the called party number.called dial-string
Filters output on the basis of the calling party number.caller dial-string
Filters debug messages for general packet radioservice (GPRS) tunneling protocol (GTP) processingon the gateway GPRS support node (GGSN) basedon the tunnel identifier (TID) or international mobilesystem identifier (IMSI) in a Packet Data Protocol(PDP) Context Create Request message.
calling tidi/imsi-string
Filters output on the basis of the specified domain.domain domain-name
Filters output on the basis of the specified fabricextender and specified module.
fex fabric-extender-number modulemodule-number
Filters output on the basis of the specified interfaceID.
interface interface-id
Filters output on the basis of the specified IP address.ip ip-address
Filters messages on the specified MAC address.mac-address hexadecimal-mac-address
Filters output on the basis of the specified modulenumber.
module module-number
Filters output on the basis of the port-bundle host key(PBHK) that uniquely identifies the session.
portbundle ip ip-address
Specifies the port bundle.bundle bundle-number
Filters output on the specified Intelligent ServiceArchitecture (ISA) session identifier.
session-id session-number
Cisco IOS Debug Command Reference - Commands A through D 413
debug clns esis events through debug dbconn tcpdebug condition
Filters output on the basis of the specified switch andspecified module.
switch switch-number module module-number
Filters output on the basis of the specified username.username username
Filters output on the basis of the specified VC ID.vcid vc-id
Filters output on the basis of the specified VLAN ID.vlan vlan-id
ID number of the condition to be removed.condition-id
Removes all debugging conditions, and conditionsspecified by the debug condition interface command.Use this keyword to disable conditional debuggingand reenable debugging for all interfaces.
all
Command Default All debugging messages for enabled protocol-specific debug commands are generated.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.11.3(2)AA
This commandwasmodified. The vcid and ip keywords were added to supportthe debugging of Any Transport over MPLS (AToM) messages.
12.0(23)S
This command was integrated into Cisco IOS Release 12.2(14)S.12.2(14)S
This command was integrated into Cisco IOS Release 12.2(15)T.12.2(15)T
This command was modified. Support was added on the GGSN.12.3(2)XB
This command was modified. The calling keyword and tid/imsi-stringargument were added.
12.3(8)T
This command was modified. The ability to filter output on the followingconditions was added: domain, MAC address, PBHK, and ISA session ID.
12.2(28)SB
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
This command was modified. The vlan vlan-id keyword and argument andthe interface interface-id keyword and argument were added.
15.2(2)T
Cisco IOS Debug Command Reference - Commands A through D414
debug clns esis events through debug dbconn tcpdebug condition
Usage Guidelines Use the debug condition command to restrict the debug output for some commands. If any debug conditioncommands are enabled, output is generated only for interfaces associated with the specified keyword. Inaddition, this command enables debugging output for conditional debugging events. Messages are displayedas different interfaces meet specific conditions.
If multiple debug condition commands are enabled, output is displayed if at least one condition matches. Allthe conditions do not need to match.
The no form of this command removes the debug condition specified by the condition identifier. The conditionidentifier is displayed after you use a debug condition command or in the output of the show debug conditioncommand. If the last condition is removed, debugging output resumes for all interfaces. You will be askedfor confirmation before removing the last condition or all conditions.
Not all debugging output is affected by the debug condition command. Some commands generate outputwhenever they are enabled, regardless of whether they meet any conditions.
The following components are supported for Intelligent Service Architecture (ISA) distributed conditionaldebugging:
• Authentication, authorization, and accounting (AAA) and RADIUS
• ATM components
• Feature Manager
• Policy Manager
• PPP
• PPP over Ethernet (PPPoE)
• Session Manager
• Virtual Private Dialup Network (VPDN)
Ensure that you enable TID/IMSI-based conditional debugging by entering debug condition calling beforeconfiguring debug gprs gtp and debug gprs charging. In addition, ensure that you disable the debug gprsgtp and debug gprs charging commands using the no debug all command before disabling conditionaldebugging using the no debug condition command. This will prevent a flood of debugging messages whenyou disable conditional debugging.
Examples
Examples In the following example, the router displays debugging messages only for interfaces that use a username ofuser1. The condition identifier displayed after the command is entered identifies this particular condition.
Router# debug condition username user1Condition 1 set
Examples The following example specifies that the router should display debugging messages only for VC 1000:
Router# debug condition vcid 1000Condition 1 set01:12:32: 1000 Debug: Condition 1, vcid 1000 triggered, count 101:12:32: 1000 Debug: Condition 1, vcid 1000 triggered, count 1
Cisco IOS Debug Command Reference - Commands A through D 415
debug clns esis events through debug dbconn tcpdebug condition
The following example enables other debugging commands. These debugging commands will only displayinformation for VC 1000.
Router# debug mpls l2transport vc event
AToM vc event debugging is on
Router# debug mpls l2transport vc fsm
AToM vc fsm debugging is onThe following commands shut down the interface on which VC 1000 is established:
Router(config)# interface serial3/1/0Router(config-if)# shutThe debugging output shows the change to the interface where VC 1000 is established:
01:15:59: AToM MGR [13.13.13.13, 1000]: Event local down, state changed from establishedto remote ready01:15:59: AToM MGR [13.13.13.13, 1000]: Local end down, vc is down01:15:59: AToM SMGR [13.13.13.13, 1000]: Processing imposition update, vc_handle 6227BCF0,update_action 0, remote_vc_label 1801:15:59: AToM SMGR [13.13.13.13, 1000]: Imposition Disabled01:15:59: AToM SMGR [13.13.13.13, 1000]: Processing disposition update, vc_handle 6227BCF0,update_action 0, local_vc_label 75501:16:01:%LINK-5-CHANGED: Interface Serial3/1/0, changed state to administratively down01:16:02:%LINEPROTO-5-UPDOWN: Line protocol on Interface Serial3/1/0, changed state to down
Related Commands DescriptionCommand
Limits output for some debugging commands basedon the interfaces.
debug condition interface
Cisco IOS Debug Command Reference - Commands A through D416
debug clns esis events through debug dbconn tcpdebug condition
debug condition application voiceTo display debugging messages for only the specified VoiceXML application, use thedebugconditionapplicationvoicecommand in privileged EXEC mode. To disable debugging output, use theno form of this command.
debug condition application voice application-name
no debug condition application voice application-name
Syntax Description Name of the VoiceXML application for which youwant to display all enabled debugging messages.
application-name
Command Default If this command is not configured, debugging messages are enabled for all VoiceXML applications.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced for the Cisco 3640, Cisco 3660, CiscoAS5300, Cisco AS5350, and Cisco AS5400.
12.2(11)T
Usage Guidelines• This command filters debugging output only for the debugvxmland debughttpclient commands, exceptthat it does not filter output for the debugvxmlerror, debugvxmlbackground, debughttpclienterror,or debughttpclientbackground commands. It does not filter messages for any other debug commandssuch as the debugvoipivr command or the debugvoiceivr command.
• This command filters debugging output for all VoiceXML applications except the application named inthe command. When this command is configured, the gateway displays debugging messages only forthe specified VoiceXML application.
• To filter debugging output with this command, the <cisco-debug> element must be enabled in theVoiceXML document. For more information about the <cisco-debug> element, refer to the CiscoVoiceXML Programmer’s Guide.
• To see debugging output for VoiceXML applications, you must first configure global debug commandssuch as the debugvxmlcommand or the debughttpclientcommand. If no global debug commands areturned on, you do not see debugging messages even if the debugconditionapplicationvoice commandis configured and the <cisco-debug> element is enabled in the VoiceXML document.
• This command can be configured multiple times to display output for more than one application.
• To see which debug conditions have been set, use the showdebugcondition command.
Cisco IOS Debug Command Reference - Commands A through D 417
debug clns esis events through debug dbconn tcpdebug condition application voice
Examples The following example disables debugging output for all applications except the myapp1 application, if the<cisco-debug> element is enabled in the VoiceXML documents that are executed by myapp1:
Router# debug condition application voice myapp1
Related Commands DescriptionCommand
Displays debugging messages for the HTTP client.debug http client
Displays debugging messages for VoiceXMLfeatures.
debug vxml
Displays the debugging conditions that have beenenabled for VoiceXML application.
show debug condition
Cisco IOS Debug Command Reference - Commands A through D418
debug clns esis events through debug dbconn tcpdebug condition application voice
debug condition glbpTo display debugging messages about Gateway Load Balancing Protocol (GLBP) conditions, use thedebugconditionglbp command in privileged EXEC mode. To disable debugging output, use the no form ofthis command.
debug condition glbp interface-type interface-number group [ forwarder ]
no debug condition glbp interface-type interface-number group [ forwarder ]
Syntax Description Interface type for which output is displayed.interface-type
Interface number for which output is displayed.interface-number
GLBP group number in the range from 0 to 1023.group
(Optional) Number in the range from 1 to 255 usedto identify a virtual MAC address.
forwarder
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(14)S
This command was integrated into Cisco IOS Release 12.2(15)T.12.2(15)T
This command was integrated into Cisco IOS Release 12.2(17b)SXA.12.2(17b)SXA
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Examples The following is sample output from the debugconditionglbpcommand:
Router# debug condition glbp fastethernet 0/0 10 1Condition 1 set5d23h: Fa0/0 GLBP10.1 Debug: Condition 1, glbp Fa0/0 GLBP10.1 triggered, count 1
Related Commands DescriptionCommand
Displays debugging messages about GLBP errors.debug glbp errors
Displays debugging messages about GLBP events.debug glbp events
Cisco IOS Debug Command Reference - Commands A through D 419
debug clns esis events through debug dbconn tcpdebug condition glbp
DescriptionCommand
Displays debugging messages about GLBP packets.debug glbp packets
Displays a limited range of debuggingmessages aboutGLBP errors, events, and packets.
debug glbp terse
Cisco IOS Debug Command Reference - Commands A through D420
debug clns esis events through debug dbconn tcpdebug condition glbp
debug condition interfaceTo limit output for some debug commands on the basis of the interface, virtual circuit (VC), or VLAN, usethe debugconditioninterface command in privileged EXEC mode. To remove the interface condition andreset the interface so that it must be triggered by a condition, use the no form of this command.
debug condition interface interface-type interface-number [dlci dlci] [vc {vci| vpivci}] [vlan-id vlan-id]
no debug condition interface interface-type interface-number [dlci dlci] [vc {vci| vpivci}] [vlan-id vlan-id]
Syntax Description Interface type and number. For more information, usethe question mark (?) online help function.
interface-type interface-number
(Optional) Specifies the data-link connection identifier(DLCI), if the interface to be debugged is a FrameRelay-encapsulated interface.
dlci dlci
(Optional) Specifies the virtual channel identifier(VCI) or virtual path identifier/virtual channelidentifier (VPI/VCI) pair, if the interface to bedebugged is an ATM-encapsulated interface.
vc {vci | vpi/vci}
(Optional) Specifies the VLAN ID, if the interface tobe debugged is ATM, Ethernet, Fast Ethernet, orGigabit Ethernet interface.
vlan-id vlan-id
Command Default All debugging messages for enabled debug commands are displayed.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(11)T
This command was modified. The dlci and vc keywords were added foradditional Frame Relay and ATM functionality.
12.0(28)S
This command was modified. It was integrated into Cisco IOS Release12.2(25)S.
12.2(25)S
This command was modified. It was integrated into Cisco IOS Release12.2(27)SBC.
12.2(27)SBC
Cisco IOS Debug Command Reference - Commands A through D 421
debug clns esis events through debug dbconn tcpdebug condition interface
ModificationRelease
This command was modified. It was integrated into Cisco IOS Release12.2(28)SB, and the ability to filter debug output on the basis of VLAN IDwas added.
12.2(28)SB
This command was modified. It was integrated into Cisco IOS Release12.4(9)T.
12.4(9)T
This command was modified. It was integrated into Cisco IOS Release12.2(33)SRE.
12.2(33)SRE
This command was modified. It was integrated into Cisco IOS XE Release2.5.
Cisco IOS XE 2.5
Usage Guidelines Use this command to restrict the debugging output for some commands on the basis of an interface or virtualcircuit. When you enter this command, debugging output is disbaled for all interfaces except the specifiedinterface or virtual circuit. In addition, this command enables conditional debugging to limit output for specificdebugging events. Messages are displayed as different interfaces meet specific conditions.
The no form of this command performs the following functions:
• Disables the debugconditioninterface command for the specified interface. Output is no longer generatedfor the interface, assuming that the interface meets no other applicable conditions. If the interface meetsother conditions that have been set by another debugcondition command, debugging output will stillbe generated for the interface.
• If some other debugcondition command has been enabled, output is stopped for that interface until thecondition is met on the interface. You will be asked for confirmation before the last condition or allconditions are removed.
Not all debugging output is affected by the debugcondition command. Some commands generate outputwhenever they are enabled, regardless of whether they meet any conditions. The commands that are affectedby the debugcondition commands are generally related to dial access functions, where a large amount ofoutput is expected. Output from the following commands is controlled by the debugconditioncommand:
• debug aaa
• debug atm
• debug dialer events
• debug frame-relay
• debug isdn
• debug modem
• debug ppp
One or more ATM-encapsulated interfacesmust be enabled, and one or more of the following debug commandsmust be enabled to use conditional debugging with ATM:
• debug atm arp
Cisco IOS Debug Command Reference - Commands A through D422
debug clns esis events through debug dbconn tcpdebug condition interface
• debug atm counters
• debug atm errors
• debug atm events
• debug atm oam
• debug atm packet
• debug atm state
One or more of the following debug commands must be enabled to use conditional debugging with FrameRelay:
• debug frame-relay adjacency
• debug frame-relay ipc
• debug frame-relay lmi
• debug frame-relay packet
• debug frame-relay pseudowire
Examples In the following example, only debug command output related to serial interface 1 is displayed. The conditionidentifier for this command is 1.
Router# debug condition interface serial 1Condition 1 setThe following example shows how to enable an ATM interface, specifies an IP address for the interface, turnson conditional debugging for that interface with a VPI/VCI pair of 255/62610, and verifies that debugginghas been enabled:
Router> enablePassword:Router# configure terminalEnter configuration commands, one per line. End with CNTL/Z.Router(config)# interface atm 2/0Router(config-if)# ip address 209.165.201.2 255.255.255.0Router(config-if)# pvc 255/62610Router(config-if-atm-vc)# no shutdownRouter(config-if)# exitRouter(config)# exit2w3d: %SYS-5-CONFIG_I: Configured from console by consoleRouter# debug condition interface atm 2/0 vc 255/62610Condition 1 set2w3d: ATM VC Debug: Condition 1, atm-vc 255/62610 AT2/0 triggered, count 1Router# show debug conditionCondition 1: atm-vc 255/62610 AT2/0 (1 flags triggered)
Flags: ATM VCThe following example shows how to enable Frame Relay conditional debugging on Frame Relay DLCI 105:
Router# debug condition interface serial 4/3 dlci 105Router# debug frame-relay packet
The following example shows how to disable the conditional debugging onVC. Awarningmessage is displayedwhen the last condition is removed.
Router> enableRouter# no debug condition interface atm 1/0 vc 4335
Cisco IOS Debug Command Reference - Commands A through D 423
debug clns esis events through debug dbconn tcpdebug condition interface
This condition is the last interface condition set.Removing all conditions may cause a flood of debuggingmessages to result, unless specific debugging flagsare first removed.Proceed with removal? [yes/no]: yCondition 1 has been removed
Related Commands DescriptionCommand
Limits output for some debug commands on the basisof specific conditions.
debug condition
Displays debugging information about the packetsreceived on a Frame Relay interface.
debug frame-relay
Displays the debugging filters that have been enabledfor VoiceXML. applications, ATM-enabled interfaces,or Frame Relay interfaces
show debug condition
Cisco IOS Debug Command Reference - Commands A through D424
debug clns esis events through debug dbconn tcpdebug condition interface
debug condition match-listTo run a filtered debug on a voice call, use the debugconditionmatch-list command in privileged EXECmode. To disable debugging output, use the no form of this command.
debug condition match-list number {exact-match| partial-match}
no debug condition match-list number {exact-match| partial-match}
Syntax Description Numeric label that uniquely identifies the match list.Range is 1 to 16. The number for the match list is setusing the callfiltermatch-list command.
number
All related debug output is filtered until all conditionsin the match list are explicitly met. This is the bestchoice for most situations because the output is themost concise.
exact-match
No related debug output is filtered until there is asingle explicit match failure. As long as zero or moreconditions are met, debug output will not be filtered.This choice is useful in debugging call startupproblems like digit collection, but is not ideal formany situations because there is much debug outputuntil matches explicitly fail.
partial-match
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.3(4)T
Examples In this output example, the following configuration was used:
call filter match-list 1 voiceincoming calling-number 8288807incoming called-number 6560729incoming port 7/0:D
Cisco IOS Debug Command Reference - Commands A through D 425
debug clns esis events through debug dbconn tcpdebug condition match-list
The following is sample output for the debugconditionmatch-list1 command. The next several lines matchthe above conditions.
Router# debug condition match-list 107:22:19://-1/3C0B9468-15C8-11D4-8013-000A8A389BA8/VTSP:(7/0:D):0:0:0/vtsp_gcfm_incoming_cond_notify:add incoming port cond success: 7/0:D07:22:19://-1/3C0B9468-15C8-11D4-8013-000A8A389BA8/VTSP:(7/0:D):0:0:0/vtsp_gcfm_incoming_cond_notify:add incoming dialpeer tag success:107:22:19://-1/3C0B9468-15C8-11D4-8013-000A8A389BA8/VTSP:(7/0:D):0:0:0/vtsp_update_dsm_stream_mgr_filter_flag:cannot find dsp_stream_mgr_t07:22:19://-1/3C0B9468-15C8-11D4-8013-000A8A389BA8/VTSP:(7/0:D):0:0:0/vtsp_update_dsm_stream_mgr_filter_flag:update dsp_stream_mgr_t debug flag07:22:19: //49/3C0B9468-15C8-11D4-8013-000A8A389BA8/VTSP:(7/0:D):0:0:0/vtsp_insert_cdb:,cdb 0x6482C518, CallID=4907:22:19://49/3C0B9468-15C8-11D4-8013-000A8A389BA8/VTSP:(7/0:D):0:0:0/vtsp_do_call_setup_ind:Call ID=98357, guid=3C0B9468-15C8-11D4-8013-000A8A389BA8The table below describes the significant fields shown in the display.
Table 56: debug condition match-list Field Descriptions
DescriptionField
Shows the global unique identifier (GUID).3C0B9468-15C8-11D4-8013-000A8A389BA8
Identifies the voice telephony service provider(VTSP) module.
VTSP:
Shows the port name, channel number, DSP slot, andDSP channel number for the VTSP module.
(7/0:D):0:0:0
Related Commands DescriptionCommand
Creates a call filter match list for debugging voicecalls.
call filter match-list voice
Displays the debug trace inside the GCFM.debug call filter inout
Displays call filter match lists.show call filter match-list
Cisco IOS Debug Command Reference - Commands A through D426
debug clns esis events through debug dbconn tcpdebug condition match-list
debug condition standbyTo filter the output of the debugstandbycommand on the basis of interface and Hot Standby Router Protocol(HSRP) group number, use thedebugconditionstandbycommand in privileged EXEC mode. To remove thespecified filter condition, use the no form of this command.
debug condition standby interface group-number
no debug condition standby interface group-number
Syntax Description Filters output on the basis of the interface.interface
Filters output on the basis of HSRP group number.The range is 0 to 255 for HSRP Version 1 and 0 to4095 for HSRP Version 2.
group-number
Command Default All debugging messages for the debugstandbycommand aregenerated.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.1(2)
Usage Guidelines Use the debugconditionstandbycommand to restrict the debug output for the debugstandby command. Ifthe debugconditionstandbycommand is enabled, output is generated only for the interfaces and HSRP groupnumbers specified. The interface you specify must be a valid interface capable of supporting HSRP. The groupcan be any group (0 to 255 for HSRPv1 and 0 to 4095 for HSRPv2).
Use the no form of this command to remove the HSRP debug condition. If the last condition is removed,debugging output resumes for all interfaces. You will be asked for confirmation before removing the lastcondition or all conditions.
You can set debug conditions for groups that do not exist, which allows you to capture debug informationduring the initialization of a new group.
You must enable the debug standby command in order for any HSRP debug output to be produced. If you donot configure the debugconditionstandby command after entering the debugstandbycommand, then debugoutput is produced for all groups on all interfaces.
Cisco IOS Debug Command Reference - Commands A through D 427
debug clns esis events through debug dbconn tcpdebug condition standby
Examples In the following example, the router displays debugging messages only for Ethernet interface 0/0 that are partof HSRP group 23:
Router# debug standbyHSRP debugging is onRouter# debug condition standby ethernet0/0 23Condition 1 set00:27:39: HSRP: Et0/0 Grp 23 Hello out 10.0.0.1 Active pri 100 vIP 172.16.6.500:27:42: HSRP: Et0/0 Grp 23 Hello out 10.0.0.1 Active pri 100 vIP 172.16.6.500:27:45: HSRP: Et0/0 Grp 23 Hello out 10.0.0.1 Active pri 100 vIP 172.16.6.500:27:48: HSRP: Et0/0 Grp 23 Hello out 10.0.0.1 Active pri 100 vIP 172.16.6.500:27:51: HSRP: Et0/0 Grp 23 Hello out 10.0.0.1 Active pri 100 vIP 172.16.6.5The following example shows how to remove an HSRP debug condition:
Router# no debug condition standby ethernet0/0 23This condition is the last hsrp condition set.Removing all conditions may cause a flood of debuggingmessages to result, unless specific debugging flagsare first removed.Proceed with removal? [yes/no]: YCondition 1 has been removed.
Related Commands DescriptionCommand
Limits output for some debugging commands basedon the interfaces.
debug condition interface
Displays HSRP state changes.debug standby
Displays error messages related to HSRP.debug standby errors
Displays events related to HSRP.debug standby events
Displays debugging messages for the HSRP ICMPredirects filter.
debug standby events icmp
Displays debugging information for packets relatedto HSRP.
debug standby packets
Cisco IOS Debug Command Reference - Commands A through D428
debug clns esis events through debug dbconn tcpdebug condition standby
debug condition voice-portTo display debug output for a specified port, use the debugconditionvoice-port command in privileged EXECmode. To enable debugging messages for all voice ports, use the no form of this command.
debug condition voice-port port-number
no debug condition voice-port port-number
Syntax Description Voice port for which you want to display all enableddebugging messages.
Syntax for the port-numberargument isplatform-dependent; type ? to determineavailable options for argument syntax.
Note
port-number
Command Default Debugging messages are enabled for all voice ports.
Command Modes Privileged EXEC(#)
Command History ModificationRelease
This command was introduced.12.4(6)T
Usage Guidelines This command filters out debugging output for all voice ports except the port specified in the command.Whenthis command is configured, the gateway displays debugging messages only for the specified port.
To display debugging output, youmust first enable the debugvoipapplicationstcappallcommand. If no debugcommands are turned on, no debugging messages are displayed even if the debugconditionvoice-portcommand is enabled.
The debugconditionvoice-port command can be configured multiple times to display output for more thanone voice port. This command differs from the debugvoipapplicationstcappportcommand, which can beconfigured to display output for only one voice port.
To display which debug conditions have been set, use the showdebug command.
Before disabling conditions, first disable any debugging commands; otherwise output for all ports could floodthe logging buffer.
Examples The following example filters debugging output so that output only for ports 2/1 and 2/3 is displayed:
Router# debug condition voice-port 2/1Condition 1 set*Mar 1 22:24:15.102: Debug: Condition 1, voice-port 2/1 triggered, count 1
Cisco IOS Debug Command Reference - Commands A through D 429
debug clns esis events through debug dbconn tcpdebug condition voice-port
Router# debug condition voice-port 2/3Condition 2 set*Mar 1 22:24:24.794: Debug: Condition 2, voice-port 2/3 triggered, count 2Router# show debugCondition 1: voice-port 2/1 (1 flags triggered)
Flags: voice-port conditionCondition 2: voice-port 2/3 (1 flags triggered)
Flags: voice-port condition
Related Commands DescriptionCommand
Displays debugging information for SCCP.debug sccp all
Displays debugging information for the componentsof the STCAPP.
debug voip application stcapp all
Enables STCAPP debugging for a specific port.debug voip application stcapp port
Displays the types of debugging and the debuggingconditions that are enabled on your router.
show debug
Cisco IOS Debug Command Reference - Commands A through D430
debug clns esis events through debug dbconn tcpdebug condition voice-port
debug condition vrfTo limit debug output to a specific Virtual Routing and Forwarding (VRF) instance, use thedebugconditionvrfcommand in privileged EXEC mode. To remove the debug condition, use the undebugversion of the command .
debug condition vrf vrf-name
undebug condition vrf vrf-name
Syntax Description Name of a VRF.vrf-name
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.Cisco IOS XE Release 3.2S
Usage Guidelines Use this command to limit debug output to a single VRF.
EIGRP does not support the debugconditionvrf command.Note
Examples The following example shows how to limit debugging output to VRF red:
Router# debug condition vrf red
Related Commands DescriptionCommand
Defines a virtual routing and forwarding instance.vrf definition
Cisco IOS Debug Command Reference - Commands A through D 431
debug clns esis events through debug dbconn tcpdebug condition vrf
debug condition xconnectTo conditionally filter debug messages related to xconnect configurations, use the debugconditionxconnectcommand in privileged EXEC configuration mode. To disable the filtering of xconnect debug messages, usethe no form of this command.
debug condition xconnect {fib type| interface type number [dlci| vp number| vc number]| peer ip-addressvcid vcid| segment segment-id}
no debug condition xconnect {fib type| interface type number [dlci| vp number| vc number]| peer ip-addressvcid vcid| segment segment-id}
Syntax Description Filters control-plane and data-plane debug messagesfor the xconnect segment pair specified by matchingagainst the Forwarding Information Base (FIB)Interface Descriptor Block (IDB) informationassociated with a particular interface on a line card.
fib type
Filters control-plane and data-plane debug messagesfor the xconnect segment pair specified by theinterface type and number on a Route Processor.
interface type number
(Optional) The Frame Relay data-link connectionidentifier (DLCI) for the xconnect segment pairassociated with a Frame Relay segment.
dlci
(Optional) The ATM virtual path (VP) number forthe xconnect segment pair associated with an ATMsegment.
vp number
(Optional) The ATM virtual circuit (VC) number forthe xconnect segment pair associated with an ATMsegment.
vc number
Filters control-plane and data-plane debug messagesfor the xconnect segment pair specified by the remotepeer IP address and the pseudowire virtual circuit ID(VCID).
peer
The IP address of the remote peer router.ip-address
The VCID of the xconnect pseudowire.vcid vcid
Filters data-plane debug messages for the xconnectsegment pair specified by a segment ID.
segment
The segment ID. The segment ID value can be foundin the output of the showssmid command.
segment-id
Cisco IOS Debug Command Reference - Commands A through D432
debug clns esis events through debug dbconn tcpdebug condition xconnect
Command Default Debug messages are not filtered.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(28)SB
This command was integrated in Cisco IOS Release 15.3(1)S.15.3(1)S
Usage Guidelines Use the debugconditionxconnect command to specify conditions for filtering the debug messages displayedby related subscriber service switch (SSS), xconnect, and attachment circuit debug commands.
Examples The following example sets filter conditions that allow related debug commands to display debug messagesfor only the xconnect segment pair specified by the remote peer IP address and the pseudowire VCID:
debug condition xconnect peer 10.0.0.1 vcid 100The following example sets filter conditions that allow related debug commands to display debug messagesfor only the xconnect segment pair specified by the serial interface number and DLCI:
debug condition xconnect interface serial 0/0 100The following example sets filter conditions that allow related debug commands to display debug messagesfor only the xconnect segment pair specified by the port mode ATM interface number:
debug condition xconnect interface atm 0/0The following example sets filter conditions that allow related debug commands to display debug messagesfor only the xconnect segment pair specified by the VP mode ATM interface number:
debug condition xconnect interface atm 0/0 vp 1The following example sets filter conditions that allow related debug commands to display debug messagesfor only the xconnect segment pair specified by the VC mode ATM interface number:
debug condition xconnect interface atm 0/0 vc 1/40The following example finds the segment ID associated with an L2TPv3 xconnect segment pair and sets filterconditions that allow related debug commands to display debug messages for only that xconnect segmentpair:
Router# show ssm id!Segment-ID: 8193 Type: L2TPv3[8]!Router# debug conditional xconnect segment 8193
Cisco IOS Debug Command Reference - Commands A through D 433
debug clns esis events through debug dbconn tcpdebug condition xconnect
Related Commands DescriptionCommand
Displays errors and events that occur on theattachment circuits.
debug acircuit
Displays messages about AAA authorization eventsthat are part of normal call establishment.
debug sss aaa authorization event
Displays information about AAA authorization statechanges.
debug sss aaa authorization fsm
Displays diagnostic information about errors that mayoccur during SSS call setup.
debug sss error
Displays diagnostic information about SSS call setupevents.
debug sss event
Displays diagnostic information about the SSS callsetup state.
debug sss fsm
Displays debug messages related to an xconnectconfiguration.
debug xconnect
Displays SSM information for switched Layer 2segments.
show ssm id
Cisco IOS Debug Command Reference - Commands A through D434
debug clns esis events through debug dbconn tcpdebug condition xconnect
debug configuration lockTo enable debugging of the Cisco IOS configuration lock, use the debugconfigurationlockcommand inprivileged EXEC mode. To disable debugging output, use the no form of this command.
debug configuration lock
no debug command lock
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.3(14)T
This command was integrated into Cisco IOS Release 12.0(31)S.12.0(31)S
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
This command is supported in the Cisco IOS Release 12.2SX train. Supportin a specific 12.2SX release of this train depends on your feature set, platform,and platform hardware.
12.2SX
This command was integrated into Cisco IOS Release 12.2(33)SB.12.2(33)SB
Examples The following is sample output with debugconfigurationlock enabled (assuming that the feature is enabledusing the configurationmodeexclusivemanual command in global configuration mode):
Router# debug configuration lockSession1 from console==========================Router# configure terminal lockConfiguration mode locked exclusively. The lock will be cleared once you exit out ofconfiguration mode using end/exitEnter configuration commands, one per line. End with CNTL/Z.Router(config)#Parser : LOCK REQUEST in EXCLUSIVE modeParser: <configure terminal lock> - Config. Lock requested by process <3> client <PARSERClient>Parser: <configure terminal lock> - Config. Lock acquired successfully !Router(config)#Session2 VTY (User from session2 is trying to enter single user config (exclusive) configmode)=================================Router# configure terminal lock
Configuration mode locked exclusively by user 'unknown' process '3' from terminal '0'.Please try later.
Cisco IOS Debug Command Reference - Commands A through D 435
debug clns esis events through debug dbconn tcpdebug configuration lock
Router#Session1 from console=======================Router(config)#Parser : LOCK REQUEST in EXCLUSIVE modeParser: <configure terminal lock> - Config. Lock requested by process <104> client <PARSERClient>Parser: <configure terminal lock> - NON_BLOCKING : Config mode locked <EXCLUSIVE> owner <3>Router(config)#Router(config)# endRouter#%SYS-5-CONFIG_I: Configured from console by consoleParser: <Configure terminal> - Config. EXC UnLock requested by user<3>Parser: <Configure terminal> - Config UNLOCKED !Router#
Related Commands DescriptionCommand
Enables single-user (exclusive) access functionalityfor the Cisco IOS CLI.
configuration mode exclusive
Displays information about the lock status of therunning configuration file during a configurationreplace operation.
show configuration lock
Cisco IOS Debug Command Reference - Commands A through D436
debug clns esis events through debug dbconn tcpdebug configuration lock
debug confmodemTo display information associated with the discovery and configuration of the modem attached to the router,use the debugconfmodemcommand in privileged EXECmode. To disable debugging output, use the no formof this command.
debug confmodem
no debug confmodem
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines Thedebugconfmodem command is used in debugging configurations that use themodemautoconfig command.
Examples The following is sample output from thedebugconfmodemcommand. In the first three lines, the router issearching for a speed at which it can communicate with the modem. The remaining lines show the actualsending of the modem command.
Router# debug confmodemTTY4:detection speed(115200) response ------TTY4:detection speed(57600) response ------TTY4:detection speed(38400) response ---OK---TTY4:Modem command: --AT&F&C1&D2S180=3S190=1S0=1--TTY4: Modem configuration succeededTTY4: Done with modem configuration
Cisco IOS Debug Command Reference - Commands A through D 437
debug clns esis events through debug dbconn tcpdebug confmodem
debug connTo display information from the connection manager, time-division multiplexing (TDM) and digital signalprocessor (DSP) clients, use the debugconncommand in privileged EXECmode. To disable debugging output,use the no form of this command.
debug conn
no debug conn
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command is supported on Cisco 3600 series routers.12.1(5)XM
This command is supported on Cisco 2600 series routers and was integratedinto Cisco IOS Release 12.2(4)T.
12.2(4)T
Examples The following example shows connection manager debugging output:
Router# debug connConnection Manager debugging is onRouter# configure terminalEnter configuration commands, one per line. End with CNTL/Z.Router(config)# connect conn1 t1 3/0 1 t1 4/0 1
Router(config-tdm-conn)# exit*Mar 6 18:30:59:%CONN TDM:Segment attached to dsx1*Mar 6 18:30:59:%CONN TDM:Parsed segment 1*Mar 6 18:30:59:%CONN TDM:Segment attached to dsx1*Mar 6 18:30:59:%CONN TDM:Parsed segment 2*Mar 6 18:30:59:%CONN:Creating new connectionRouter(config)#*Mar 6 18:31:01:%CONN TDM:Interwork Segments*Mar 6 18:31:01:CONN TDM:Init Segment @ 61C26980*Mar 6 18:31:01:CONN TDM:Init Segment @ 61C26A44*Mar 6 18:31:01:%CONN TDM:Activating Segment @ 61C26980*Mar 6 18:31:01:%CONN:Segment alarms for conn conn1 are 2*Mar 6 18:31:01:%CONN TDM:Activating Segment @ 61C26A44*Mar 6 18:31:01:%CONN:Segment alarms for conn conn1 are 0*Mar 6 18:31:01:%CONN TDM:Connecting Segments*Mar 6 18:31:01:%CONN TDM:MAKING CONNECTION*Mar 6 18:31:01:%CONN:cm_activate_connection, stat = 5Router(config)#
Cisco IOS Debug Command Reference - Commands A through D438
debug clns esis events through debug dbconn tcpdebug conn
debug content-scan
Effective with Cisco IOS Release 15.4(2)T, the debug content-scan command is replaced by the debugcws command. See the debug cws command for more information.
Note
To enable content scan debugging, use the debug content-scan command in privileged EXEC mode. Todisable content scan debugging, use the no form of this command.
debug content-scan {access-list {access-list-number | extended-access-list-number | access-list-name}|control-plane| errors | events | function-trace | packet-path}
no debug content-scan {access-list {access-list-number | extended-access-list-number | access-list-name}|control-plane | errors | events | function-trace | packet-path}
Syntax Description Enables debugging of content scan access control lists (ACLs).access-list
Access list number. The range is from 1 to 199.access-list-number
Extended access list number. The range is from 1300 to 2699.extended-access-list-number
Access list name.access-list-number
Enables debugging of content scan control plane messages.control-plane
Enables debugging of content scan errors.errors
Enables debugging of content scan events.events
Enables debugging of content scan function trace.function-trace
Enables debugging of content scan packet path.packet-path
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.15.2(1)T1
This command was modified. The access-list and control-plane keywordsand the access-list-number, extended-access-list-number, and access-list-namearguments were added.
15.2(4)M
This command was replaced by the debug cws command.15.4(2)T
Cisco IOS Debug Command Reference - Commands A through D 439
debug clns esis events through debug dbconn tcpdebug content-scan
Usage Guidelines The content scanning process redirects client web traffic to the ScanSafe web server.
You must configure ACLs by using the ip access-list extended command before you enable the debuggingof content-scan ACLs. The debug content-scan access-list command enables the conditional debugging forcontent scan. The conditional debugging does not work for existing sessions when you enable content scan;the ACL match occurs after the first packet is received.
Examples The following example shows how to enable extended ACL 149 and the debugging of content scan ACL 149:Device(config)# ip access-list extended 149Device(config-ext-nacl)# permit ip host 10.1.0.1Device(config-ext-nacl)# endDevice# debug content-scan access-list 149Content-scan ACL based conditional debugging is onThe following is sample output from the debug content-scan access-list 149 command:Device# debug content-scan access-list 149
Content-scan ACL based conditional debugging is on
Feb 19 19:01:02.887: CONT-SCAN-PAK-PATH:Checking if it's a web trafficSrc IP:10.1.0.1(3646),Dst IP: 198.51.100.195(80),index:4Feb 19 19:01:02.887:Feb 19 19:01:02.887: CONT-SCAN-PAK-PATH: Populating user/usergroup infoSrc IP:10.1.0.1(3646),Dst IP: 198.51.100.195(80)Feb 19 19:01:02.887: CONT-SCAN-EVE:Username Received: defpmuser Src IP:10.1.0.1(E3E) DstIP: 198.51.100.195(50) Pak:2033BCA0Feb 19 19:01:02.887: CONT-SCAN-EVE:Usergroup from pmap Src IP:10.1.0.1(E3E) Dst IP:198.51.100.195(50) Pak:2033BCA0Feb 19 19:01:02.887: CONT-SCAN-PAK-PATH:Protocol not configuredSrc IP:10.1.0.1(3646), DstIP: 198.51.100.195(80)Feb 19 19:01:02.887: CONT-SCAN-PAK-PATH:Adding session into HashSrc IP:10.1.0.1(3646), DstIP: 198.51.100.195(80)Feb 19 19:01:02.887: CONT-SCAN-PAK-PATH:Free port equals source port for src_ip 10.1.0.1(3646)dst_ip 198.51.100.195(80) 2033BCA0Feb 19 19:01:02.887: CONT-SCAN-PAK-PATH:session enqueued 21ED1DE0 for src_ip 10.1.0.1(3646)dst_ip 198.51.100.195(80)Feb 19 19:01:02.887: CONT-SCAN-PAK-PATH:Inserting Ingress session 21ED1DE0 in hash tableat 1646 Src IP:10.1.0.1(3646), Dst IP: 198.51.100.195(80)Feb 19 19:01:02.887: CONT-SCAN-PAK-PATH:Inserting Egress session 21ED1DE0 in hash table at1629 Src IP:10.1.0.1(3646), Dst IP: 198.51.100.195(80)Feb 19 19:01:02.887: CONT-SCAN-PAK-PATH:timer wheel started for 21ED1DE0 for src_ip10.1.0.1(3646)Feb 19 19:01:02.887: CONT-SCAN-EVE:1 Usergroups from auth proxy Src IP:10.1.0.1(E3E), DstIP: 198.51.100.195(50), cs_entry:21ED1DE0Feb 19 19:01:02.887: CONT-SCAN-PAK-PATH:conx 21EE2024 ingress_fd 1073741847Feb 19 19:01:02.887: CONT-SCAN-PAK-PATH:CONT SCAN: received fd1: 1073741847 and tcp flags= 0x2, payload_len = 0Feb 19 19:01:02.887: CONT-SCAN-EVE:1 Usergroups found Src IP:10.1.0.1(E3E), Dst IP:198.51.100.195(50), cs_entry:21ED1DE0!!!
Related Commands DescriptionCommand
Enables content scanning on an egress interface.content-scan out
Enables whitelisting of incoming traffic and enterscontent-scan whitelisting configuration mode.
content-scan whitelisting
Cisco IOS Debug Command Reference - Commands A through D440
debug clns esis events through debug dbconn tcpdebug content-scan
DescriptionCommand
Displays content scan information.show content-scan
Cisco IOS Debug Command Reference - Commands A through D 441
debug clns esis events through debug dbconn tcpdebug content-scan
debug control-planeTo display debugging output from the control-plane routines, use the debugcontrolplane command inprivileged EXEC mode. To disable debugging output, use the no form of this command.
debug control-plane [all| host| port-filtering| queue-thresholding| log]
no debug control-plane [all| host| port-filtering| queue-thresholding| log]
Syntax Description (Optional) Displays all events on all control-planeinterfaces.
all
(Optional) Displays all events on the control-planehost interface.
host
(Optional) Displays TCP/IP protocol port-filteringevents.
port-filtering
(Optional) Displays TCP/IP protocolqueue-thresholding events.
queue-thresholding
(Optional) Displays control-plane logging events.log
Command Default The default is debugging off.
Command Modes Privileged EXEC
Command History ModiticationRelease
This command was introduced.12.4(4)T
The log keyword was added to support control plane logging.12.4(6)T
Usage Guidelines Use the debugcontrolplane command if you want to display the debugging output from the control-planeroutines.
Examples The following example show a display from the debugcontrol-plane command:
Router# debug control-planeControl-plane infrastructure events debugging is onRouter# cp_receive_classify - marking pak hostingress pak marked cef-exception
Cisco IOS Debug Command Reference - Commands A through D442
debug clns esis events through debug dbconn tcpdebug control-plane
The following example shows a display from the debugcontrol-plane command using the port-filteringoption:
Router# debug control-plane port-filtering
TCP/IP Port filtering events debugging is onDropped UDP dport 1243 sport 62134 saddr 209.165.200.225The table below describes the significant fields shown in the display.
Table 57: debug control plane field descriptions
DescriptionField
UPD destination port.dport
UPD source port.sport
Source address of the IP packets.saddr
Related Commands DescriptionCommand
Clears packet counters for control-plane interfacesand subinterfaces.
clear control-plane
Enters control-plane configuration mode, whichallows users to associate or modify attributes orparameters that are associated with the control planeof the device.
control-plane
Displays the control plane packet counters for thecontrol plane CEF-exception subinterface.
show control-plane cef-exception counters
Displays the configured features for the control planeCEF-exception subinterface.
show control-plane cef-exception features
Displays the control-plane packet counters for theaggregate control-plane interface.
show control-plane counters
Displays the configured features for the aggregatecontrol-plane interface.
show control-plane features
Displays the control plane packet counters for thecontrol plane host subinterface.
show control-plane host counters
Displays the configured features for the control planehost subinterface.
show control-plane host features
Displays a list of open TCP/UDP ports that areregistered with the port-filter database.
show control-plane host open-ports
Cisco IOS Debug Command Reference - Commands A through D 443
debug clns esis events through debug dbconn tcpdebug control-plane
Displays the control plane packet counters for thecontrol plane transit subinterface.
show control-plane transit counters
Cisco IOS Debug Command Reference - Commands A through D444
debug clns esis events through debug dbconn tcpdebug control-plane
debug copsTo display a one-line summary of each CommonOpen Policy Service (COPS) message sent from and receivedby the router, use the debugcops command in privileged EXEC mode. To disable debugging output, use theno form of this command.
debug cops [detail]
no debug cops [detail]
Syntax Description (Optional) Displays additional debug information,including the contents of COPS and ResourceReservation Protocol (RSVP) messages.
detail
Command Default COPS process debugging is not enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.1(1)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines To generate a complete record of the policy process, enter this command and, after entering a carriage return,enter the additional command debug ip rsvp policy.
Examples This first example displays the one-line COPS message summaries, as the router goes through six differentevents.
Router# debug copsCOPS debugging is on
Examples The router becomes configured to communicate with a policy server:
Router# configure terminalEnter configuration commands, one per line. End with CNTL/Z.Router(config)# ip rsvp policy cops servers 2.0.0.1Router(config)#15:13:45:COPS: Opened TCP connection to 2.0.0.1/328815:13:45:COPS: ** SENDING MESSAGE **15:13:45:COPS OPN message, Client-type:1, Length:28. Handle:[NONE]15:13:45:COPS: ** RECEIVED MESSAGE **
Cisco IOS Debug Command Reference - Commands A through D 445
debug clns esis events through debug dbconn tcpdebug cops
15:13:45:COPS CAT message, Client-type:1, Length:16. Handle:[NONE]Router(config)#
Examples The router receives a Path message:
15:13:53:COPS:** SENDING MESSAGE **15:13:53:COPS REQ message, Client-type:1, Length:216. Handle:[ 00 00 04 01]15:13:53:COPS:** RECEIVED MESSAGE **15:13:53:COPS DEC message, Client-type:1, Length:104. Handle:[ 00 00 04 01]Router(config)#
Examples The router receives a unicast FF Resv message:
15:14:00:COPS:** SENDING MESSAGE **15:14:00:COPS REQ message, Client-type:1, Length:148. Handle:[ 00 00 05 01]15:14:00:COPS:** RECEIVED MESSAGE **15:14:00:COPS DEC message, Client-type:1, Length:64. Handle:[ 00 00 05 01]15:14:00:COPS:** SENDING MESSAGE **15:14:00:COPS RPT message, Client-type:1, Length:24. Handle:[ 00 00 05 01]Router(config)#
Examples The router receives a Resv tear:
15:14:06:COPS:** SENDING MESSAGE **15:14:06:COPS DRQ message, Client-type:1, Length:24. Handle:[ 00 00 05 01]Router(config)#
Examples The router receives a Path tear:
15:14:11:COPS:** SENDING MESSAGE **15:14:11:COPS DRQ message, Client-type:1, Length:24. Handle:[ 00 00 04 01]Router(config)#
Examples The router gets configured to cease communicating with the policy server:
Router(config)# no ip rsvp policy cops servers15:14:23:COPS:** SENDING MESSAGE **15:14:23:COPS CC message, Client-type:1, Length:16. Handle:[NONE]15:14:23:COPS:Closed TCP connection to 2.0.0.1/3288Router(config)#This second example uses the detail keyword to display the contents of the COPS and RSVP messages, andadditional debugging information:
Router# debug cops detailCOPS debugging is on02:13:29:COPS:** SENDING MESSAGE **
COPS HEADER:Version 1, Flags 0, Opcode 1 (REQ), Client-type:1, Length:216HANDLE (1/1) object. Length:8. 00 00 21 01CONTEXT (2/1) object. Length:8. R-type:5. M-type:1IN_IF (3/1) object. Length:12. Address:10.1.2.1. If_index:4OUT_IF (4/1) object. Length:12. Address:10.33.0.1. If_index:3CLIENT SI (9/1) object. Length:168. CSI data:
02:13:29: SESSION type 1 length 12:02:13:29: Destination 10.33.0.1, Protocol_Id 17, Don't Police , DstPort 4402:13:29: HOP type 1 length 12:0A01020102:13:29: :0000000002:13:29: TIME_VALUES type 1 length 8 :0000753002:13:29: SENDER_TEMPLATE type 1 length 12:
Cisco IOS Debug Command Reference - Commands A through D446
debug clns esis events through debug dbconn tcpdebug cops
02:13:29: Source 10.31.0.1, udp_source_port 4402:13:29: SENDER_TSPEC type 2 length 36:02:13:29: version=0, length in words=702:13:29: Token bucket fragment (service_id=1, length=6 words02:13:29: parameter id=127, flags=0, parameter length=502:13:29: average rate=1250 bytes/sec, burst depth=10000 bytes02:13:29: peak rate =1250000 bytes/sec02:13:29: min unit=0 bytes, max unit=1514 bytes02:13:29: ADSPEC type 2 length 84:02:13:29: version=0 length in words=1902:13:29: General Parameters break bit=0 service length=802:13:29: IS Hops:102:13:29: Minimum Path Bandwidth (bytes/sec):125000002:13:29: Path Latency (microseconds):002:13:29: Path MTU:150002:13:29: Guaranteed Service break bit=0 service length=802:13:29: Path Delay (microseconds):19200002:13:29: Path Jitter (microseconds):120002:13:29: Path delay since shaping (microseconds):19200002:13:29: Path Jitter since shaping (microseconds):120002:13:29: Controlled Load Service break bit=0 service length=002:13:29:COPS:Sent 216 bytes on socket,02:13:29:COPS:Message event!02:13:29:COPS:State of TCP is 402:13:29:In read function02:13:29:COPS:Read block of 96 bytes, num=104 (len=104)02:13:29:COPS:** RECEIVED MESSAGE **
COPS HEADER:Version 1, Flags 1, Opcode 2 (DEC), Client-type:1, Length:104HANDLE (1/1) object. Length:8. 00 00 21 01CONTEXT (2/1) object. Length:8. R-type:1. M-type:1DECISION (6/1) object. Length:8. COMMAND cmd:1, flags:0DECISION (6/3) object. Length:56. REPLACEMENT 00 10 0E 01 61 62 63 64 65 66 67
68 69 6A 6B 6C 00 24 0C 02 0000 00 07 01 00 00 06 7F 00 00 05 44 9C 40 00 46 1C 40 00 49 9896 80 00 00 00 C8 00 00 01 C8
CONTEXT (2/1) object. Length:8. R-type:4. M-type:1DECISION (6/1) object. Length:8. COMMAND cmd:1, flags:0
02:13:29:Notifying client (callback code 2)02:13:29:COPS:** SENDING MESSAGE **
COPS HEADER:Version 1, Flags 1, Opcode 3 (RPT), Client-type:1, Length:24HANDLE (1/1) object. Length:8. 00 00 21 01REPORT (12/1) object. Length:8. REPORT type COMMIT (1)
02:13:29:COPS:Sent 24 bytes on socket,02:13:29:Timer for connection entry is zero
To see an example where the debugcops command is used along with the debugiprsvppolicy command,refer to the second example of the debugiprsvppolicy command.
Related Commands DescriptionCommand
Displays debugging messages for RSVP policyprocessing.
debug ip rsvp policy
Cisco IOS Debug Command Reference - Commands A through D 447
debug clns esis events through debug dbconn tcpdebug cops
debug cotTo display information about the Continuity Test (COT) functionality, use the debugcotcommand in privilegedEXEC mode. To disable debugging output, use the no form of this command.
debug cot {api| dsp| queue| detail}
no debug cot {api| dsp| queue| detail}
Syntax Description Displays information about the COT applicationprogramming interface (API).
api
Displays information related to the COT/DigitalSignal Processor configuration (DSP) interface.Typical DSP functions include data modems, voicecodecs, fax modems and codecs, and low-levelsignaling such as channel-associated signaling(CAS)/R2.
dsp
Display information related to the COT internalqueue.
queue
Display information about COT internal detail;summary of the debugcotapi, debugcotdsp, anddebugcotqueue commands.
detail
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.11.3(7)
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Examples The following is sample output from the debugcotapi command:
Router# debug cot apiCOT API debugging is on08:29:55: cot_request_handler(): CDB@0x60DEDE14, req(COT_CHECK_TONE_ON):08:29:55: shelf 0 slot 0 appl_no 1 ds0 108:29:55: freqTX 2010 freqRX 1780 key 0xFFF1 duration 60000The table below describes the significant fields shown in the display.
Cisco IOS Debug Command Reference - Commands A through D448
debug clns esis events through debug dbconn tcpdebug cot
Table 58: debug cot api Field Descriptions
DescriptionField
Internal controller information.CDB
Type of COT operation requested.req
Shelf ID of the COT operation request.shelf
Designates the slot number, 1 to 4.slot
Hardware unit that provides the external interfaceconnections from a router to the network.
appl-no
Number of the COT operation request.ds0
COT operation identifier.key
Timeout duration of the COT operation.duration
Requested transmit tone frequency.freqTX
Requested receive tone frequency.freqRX
The following is sample output from the debugcotdsp command:
Router# debug cot dspRouter#00:10:42:COT:DSP (1/1) Allocated00:10:43:In cot_callback00:10:43: returned key 0xFFF1, status = 000:10:43:COT:Received DSP Q Event00:10:43:COT:DSP (1/1) Done00:10:43:COT:DSP (1/1) De-allocatedThe table below describes the significant fields shown in the display.
Table 59: debug cot dsp Field Descriptions
DescriptionField
Slot and port of the DSP allocated for the COToperation.
DSP (1/1) Allocated
Indicates the COT subsystem received an event fromthe DSP.
Received DSP Q Event
Slot and port of the DSP transitioning to IDLE state.DSP (1/1) Done
Slot and port of the DSP de-allocated after thecompletion of the COT operation.
DSP (1/1) De-allocated
Cisco IOS Debug Command Reference - Commands A through D 449
debug clns esis events through debug dbconn tcpdebug cot
The following is sample output from the debugcotqueue command:
Router# debug cot queueRouter#00:11:26:COT(0x60EBB48C):Adding new request (0x61123DBC) to InProgress Q00:11:26:COT(0x60EBB48C):Adding COT(0x61123DBC) to the Q head00:11:27:In cot_callback00:11:27: returned key 0xFFF1, status = 0The table below describes the significant fields shown in the display.
Table 60: debug cot api Field Descriptions
DescriptionField
Internal COT operation request.COT
Internal COT operation request queue.Adding new request
The following is sample output from the debugcotdetail command.
Router# debug cot detailRouter#00:04:57:cot_request_handler():CDB@0x60EBB48C, req(COT_CHECK_TONE_ON):00:04:57: shelf 0 slot 0 appl_no 1 ds0 100:04:57: freqTX 1780 freqRX 2010 key 0xFFF1 duration 100000:04:57:COT:DSP (1/0) Allocated00:04:57:COT:Request Transition to COT_WAIT_TD_ON00:04:57:COT(0x60EBB48C):Adding new request (0x61123DBC) to InProgress Q00:04:57:COT(0x60EBB48C):Adding COT(0x61123DBC) to the Q head00:04:57:COT:Start Duration Timer for Check Tone Request00:04:58:COT:Received Timer Event00:04:58:COT:T24 Timer Expired00:04:58:COT Request@ 0x61123DBC, CDB@ 0x60EBB48C, Params@0x61123E0800:04:58: request type = COT_CHECK_TONE_ON00:04:58: shelf 0 slot 0 appl_no 1 ds0 100:04:58: duration 1000 key FFF1 freqTx 1780 freqRx 201000:04:58: state COT_WAIT_TD_ON_CT00:04:58: event_proc(0x6093B55C)00:04:58:Invoke NI2 callback to inform COT request status00:04:58:In cot_callback00:04:58: returned key 0xFFF1, status = 000:04:58:Return from NI2 callback00:04:58:COT:Request Transition to IDLE00:04:58:COT:Received DSP Q Event00:04:58:COT:DSP (1/0) Done00:04:58:COT:DSP (1/0) De-allocatedBecause the debugcotdetailcommand is a summary of the debugcotapi, debugcotdsp, anddebugcotqueuecommands, the field descriptions are the same.
Cisco IOS Debug Command Reference - Commands A through D450
debug clns esis events through debug dbconn tcpdebug cot
debug cpp event
Effective with Release 12.3(4)T, the debugcppevent command is no longer available in Cisco IOS 12.3(T)releases.
Note
To display general Combinet Proprietary Protocol (CPP) events, use the debugcppeventcommand in privilegedEXEC mode. The noform of this command disables debugging output.
debug cpp event
no debug cpp event
Syntax Description This command has no arguments or keywords.
Command History ModificationRelease
This command was introduced.11.2
This command is no longer available in Cisco IOS 12.(3)T releases.12.3(4)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines CPP allows a router to engage in negotiation over an ISDNB channel to establish connections with a Combinetbridge.
The debugcppeventcommand displays events such as CPP sequencing, group creation, and keepalives.
Examples One or more of the messages in the table below appear when you use thedebugcppevent command. Eachmessage begins with the short name of the interface the event occurred on (for example, SERIAL0:1 orBRI0:1) and might contain one or more packet sequence numbers or remote site names.
Table 61: debug cpp event Messages
DescriptionMessage
Call was set up on the interface (in this example,BRI0:1).
BRI0:1: negotiation complete
Call timed out.BRI0:1: negotiation timed out
Negotiation packet was sent to set up the call.BRI0:1: sending negotiation packet
Cisco IOS Debug Command Reference - Commands A through D 451
debug clns esis events through debug dbconn tcpdebug cpp event
DescriptionMessage
Packet was received that was out of sequence. Thefirst number displayed in the message is the sequencenumber received, and the following numbers are therange of valid sequence numbers.
BRI0:1: out of sequence packet - got 10, range 1 8
Timer expired before the packet was received. Thefirst number displayed in the message is the sequencenumber of the packet that was lost, and the secondnumber is the next sequence number.
BRI0:1: Sequence timer expired - Lost 11 Tryingsequence 12
Router fails to maintain keepalives.BRI0:1: Line Integrity Violation
Dialer group is created on the remote site (in thisexample, ber19).
BRI0:1: create cpp group ber19 destroyed cpp groupber19
Related Commands DescriptionCommand
Displays CPP negotiation events.debug cpp negotiation
Displays CPP packets.debug cpp packet
Cisco IOS Debug Command Reference - Commands A through D452
debug clns esis events through debug dbconn tcpdebug cpp event
debug cpp negotiation
Effective with Release 12.3(4)T, the debugcppnegotiation command is no longer available in Cisco IOS12.3T releases.
Note
To display Combinet Proprietary Protocol (CPP) negotiation events, use the debugcppnegotiationcommandin privileged EXEC mode. The noform of this command disables debugging output.
debug cpp negotiation
no debug cpp negotiation
Syntax Description This command has no arguments or keywords.
Command History ModificationRelease
This command was introduced.11.2
This command is no longer available in Cisco IOS 12.3T releases.12.3(4)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines CPP allows a router to engage in negotiation over an ISDNB channel to establish connections with a Combinetbridge.
The debugcppnegotiationcommand displays events such as the type of packet and packet size being sent.
Examples The following is sample output from the debugcppnegotiation command. In this example, a sample connectionis shown.
Router# debug cpp negotiation%LINK-3-UPDOWN: Interface BRI0: B-Channel 2, changed state to down%LINK-3-UPDOWN: Interface BRI0, changed state to up%SYS-5-CONFIG_I: Configured from console by console%LINK-3-UPDOWN: Interface BRI0: B-Channel 1, changed state to upBR0:1:(I) NEG packet - len 77
attempting proto:2ether id:0040.f902.c7b4port 1 number:5559876port 2 number:5559876origination port:1remote name:berl9password is correct
The table below describes the significant fields in the display.
Cisco IOS Debug Command Reference - Commands A through D 453
debug clns esis events through debug dbconn tcpdebug cpp negotiation
Table 62: debug CPP negotiation Field Descriptions
DescriptionField
Interface name, packet type, and packet size.BR0:1 (I) NEG packet - len 77
CPP protocol type.attempting proto:
Ethernet address of the destination router.ether id:
ISDN phone number of remote B channel #1.port 1 number:
ISDN phone number of remote B channel #2.port 2 number:
B channel 1 or 2 called.origination port:
Remote site name to which this call is connecting.remote name:
Password is accepted so the connection is established.password is correct
Related Commands DescriptionCommand
Displays information about the COT functionality.debug cot
Displays CPP packets.debug cpp packet
Cisco IOS Debug Command Reference - Commands A through D454
debug clns esis events through debug dbconn tcpdebug cpp negotiation
debug cpp packet
Effective with Release 12.3(4)T, the debugcpppacketcommand is no longer available in Cisco IOS 12.3TReleases.
Note
To display Combinet Proprietary Protocol (CPP) packets, use the debugcpppacketcommand in privilegedEXEC mode. The noform of this command disables debugging output.
debug cpp packet
no debug cpp packet
Syntax Description This command has no arguments or keywords.
Command History ModificationRelease
This command was introduced.11.2
This command is no longer available in Cisco IOS 12.3T releases.12.3(4)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines CPP allows a router to engage in negotiation over an ISDNB channel to establish connections with a Combinetbridge.
The debugcpppacketcommand displays the hexadecimal values of the packets.
Examples The following is sample output from the debugcpppacket command. This example shows the interface name,packet type, packet size, and the hexadecimal values of the packet.
Router# debug cpp packetBR0:1:input packet - len 6000 00 00 00 00 00 00 40 F9 02 C7 B4 08 0.!6 00 0108 00 06 04 00 02 00 40 F9 02 C7 B4 83 6C A1 02!!!Success rate is 80 percent (4/5), round-trip min/avg/max = 64/66/68 msBR0:1 output packet - len 11606 00 00 40 F9 02 C7 B4 00 00 0C 3E 12 3A 08 0045 00 00 64 00 01 00 00 FF 01 72 BB 83 6C A1 01
Related Commands DescriptionCommand
Displays information about the COT functionality.debug cot
Displays CPP negotiation events.debug cpp negotiation
Cisco IOS Debug Command Reference - Commands A through D 455
debug clns esis events through debug dbconn tcpdebug cpp packet
Cisco IOS Debug Command Reference - Commands A through D456
debug clns esis events through debug dbconn tcpdebug cpp packet
debug credentialsTo set debugging on the credentials service that runs between the Cisco Unified Survivable Site RemoteTelephony (Cisco Unified SRST) router and Cisco CallManager, use the debugcredentials command inprivileged EXEC mode. To disable debugging output, use the no form of this command.
debug credentials
no debug credentials
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationCisco IOS Release
This command was introduced for Cisco SRST 3.3.12.3(14)T
Usage Guidelines Use this command to monitor Cisco CallManager while it requests certificates from the Cisco Unified SRSTrouter.
Examples The following is sample output showing the credentials service that runs between the Cisco Unified SRSTrouter and Cisco CallManager. The credentials service provides Cisco CallManager with the certificate fromthe Cisco Unified SRST router.
Router# debug credentialsCredentials server debugging is enabledRouter#May 25 12:08:17.944: Credentials service: Start TLS Handshake 1 10.5.43.174 4374May 25 12:08:17.948: Credentials service: TLS Handshake returns OPSSLReadWouldBlockErrMay 25 12:08:18.948: Credentials service: TLS Handshake returns OPSSLReadWouldBlockErrMay 25 12:08:19.948: Credentials service: TLS Handshake returns OPSSLReadWouldBlockErrMay 25 12:08:20.964: Credentials service: TLS Handshake completesThe table below describes the significant fields shown in the display.
Table 63: debug credentials Field Descriptions
DescriptionField
Indicates the beginning of the TLS handshakebetween the secure SRST router and CiscoCallManager. In this example, 1 indicates the socket,10.5.43.174 is the IP address, and 4374 is the port ofCisco CallManager.
Start TLS Handshake 1 10.5.43.174 4374
Indicates that the handshake is in process.TLSHandshake returns OPSSLReadWouldBlockErr
Cisco IOS Debug Command Reference - Commands A through D 457
debug clns esis events through debug dbconn tcpdebug credentials
DescriptionField
Indicates that the TLS handshake has finished andthat the Cisco CallManager has received the secureSRST device certificate.
TLS Handshake completes
Related Commands DescriptionCommand
Provides the Cisco Unified SRST router certificateto Cisco CallManager and enters credentialsconfiguration mode.
credentials (SRST)
Enables the Cisco Unified SRST router to receivemessages from Cisco CallManager through thespecified IP address and port.
ip source-address (credentials)
Displays the credentials settings on the Cisco UnifiedSRST router that are supplied to Cisco CallManagerfor use during secure SRST fallback.
show credentials
Displays information about the types of debuggingthat are enabled for your router.
show debugging
Specifies the name of the trustpoint that is to beassociated with the Cisco Unified SRST routercertificate.
trustpoint (credentials)
Cisco IOS Debug Command Reference - Commands A through D458
debug clns esis events through debug dbconn tcpdebug credentials
debug crmTo troubleshoot the Carrier Resource Manager (CRM), use the debugcrm command in privileged EXECmode. To disable debugging output, use the no form of this command.
debug crm [all| default| detail| error [call [informational]| software [informational]]| function| inout]
no debug crm
Syntax Description (Optional) Displays all CRM debugging messages.all
(Optional) Displays detail, error, and inoutinformation. This option also runs if no keywords areadded.
default
(Optional) Displays non-inout information related tocall processing, such as call updates or call acceptancechecking.
detail
(Optional) Displays CRM error messages.error
(Optional) Displays call processing errors.call
(Optional) Displays minor errors and major errors.Without the informational keyword, only majorerrors are displayed.
informational
(Optional) Displays software errors.software
(Optional) Displays CRM function names and exitpoints from each function so that call processing canbe traced within the CRM subsystem.
function
(Optional) Displays information from the functionsthat form the external interfaces of CRM to othermodules or subsystems.
inout
Command Default Debugging is not enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(11)T
Cisco IOS Debug Command Reference - Commands A through D 459
debug clns esis events through debug dbconn tcpdebug crm
ModificationRelease
The all, default, detail, error, call, informational, software, function,and inoutkeywords were added.
12.3(8)T
Usage Guidelines Disable console logging and use buffered logging before using the debugcrm command. Using the debugcrmcommand generates a large volume of debugs, which can affect router performance.
Examples The following is sample output from the debugcrmall command for an incoming ISDN call on a trunk group:
Router# debug crm all
01:21:23: //-1/xxxxxxxxxxxx/CRM/crm_send_periodic_update:01:21:23: //-1/xxxxxxxxxxxx/CRM/print_event:
RouteLabel=2023, CarrierType=TDM, EventType=Single RouteLabel Update, EventReason=BothCapacity Update,
Max Capacity mask 0x0000001F, Current Capacity Mask 0x0000001F01:21:23: //-1/xxxxxxxxxxxx/CRM/crm_call_update:
Increment the call countCarrierID=2023, TrunkGroupLabel=2023Update is for TrunkGroupLabel, Mask=0x00000001
01:21:23: //-1/xxxxxxxxxxxx/CRM/crm_call_update:IncomingVoiceCalls=1
Router#01:21:48: //-1/xxxxxxxxxxxx/CRM/crm_send_periodic_update:01:21:48: //-1/xxxxxxxxxxxx/CRM/print_event:
RouteLabel=2023, CarrierType=TDM, EventType=Single RouteLabel Update, EventReason=BothCapacity Update,
Max Capacity mask 0x0000001F, Current Capacity Mask 0x0000001F01:22:13: //-1/xxxxxxxxxxxx/CRM/crm_send_periodic_update:01:22:13: //-1/xxxxxxxxxxxx/CRM/print_event:
RouteLabel=2023, CarrierType=TDM, EventType=Single RouteLabel Update, EventReason=BothCapacity Update,
Max Capacity mask 0x0000001F, Current Capacity Mask 0x0000001FRouter#01:22:18: //-1/xxxxxxxxxxxx/CRM/crm_call_update:
Decrement the call countCarrierID=2023, TrunkGroupLabel=2023Update is for TrunkGroupLabel, Mask=0x00000001
01:22:18: //-1/xxxxxxxxxxxx/CRM/crm_call_update:IncomingVoiceCalls=0
The table below describes the significant fields shown in the display.
Cisco IOS Debug Command Reference - Commands A through D460
debug clns esis events through debug dbconn tcpdebug crm
Table 64: debug crm all Field Descriptions
DescriptionField
The format of this message is//callid/GUID/CRM/function name:
• CallEntry ID is -1. This indicates that theCallEntry ID is unavailable.
• GUID is xxxxxxxxxxxxxxxxx. This indicatesthat the GUID is unavailable.
• CRM is the module name.
• Theprint_event:field shows that the CRM isshowing the print event function.
//-1/xxxxxxxxxxxx/CRM/print_event:
Either the trunk group label or carrier ID.RouteLabel
Indicates the type of trunk.CarrierType
Indicates if a single route or all routes are updated.EventType
Shows the reason for this event being sent.EventReason
Related Commands DescriptionCommand
Specifies the maximum number of calls the trunkgroup can handle.
max-calls
Cisco IOS Debug Command Reference - Commands A through D 461
debug clns esis events through debug dbconn tcpdebug crm
debug crypto ace b2bTo enable IPSec VPN SPA debugging for a Blade Failure Group, use the debug crypto ace b2b command inprivileged EXEC mode.
debug crypto ace b2b
Command Default No default behavior or values.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(18)SXE2
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
This command is supported in the Cisco IOS Release 12.2SX train. Supportin a specific 12.2SX release of this train depends on your feature set, platform,and platform hardware.
12.2SX
Examples The following example enables IPSec VPN SPA debugging for a Blade Failure Group:
Router# debug crypto ace b2bACE B2B Failover debugging is on
Related Commands DescriptionCommand
Assigns a group ID to a Blade Failure Group.linecard-group feature card
Displays information about a Blade Failure Group.show crypto ace redundancy
Displays the components of a Blade Failure Group.show redundancy linecard-group
Cisco IOS Debug Command Reference - Commands A through D462
debug clns esis events through debug dbconn tcpdebug crypto ace b2b
debug crypto ace bootTo enable ACE boot API debugging, use the debug crypto ace boot command in privileged EXEC mode. Todisable ACE boot API debugging, use the no form of this command.
debug crypto ace boot
no debug crypto ace boot
Syntax Description This command has no arguments or keywords.
Command Default None
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SXI5
Examples The following example enables ACE boot API debugging:
Router# debug crypto ace bootACE Boot debugging is on
Cisco IOS Debug Command Reference - Commands A through D 463
debug clns esis events through debug dbconn tcpdebug crypto ace boot
debug crypto ace cfgmonTo enable ACE CFGMON transactions debugging, use the debug crypto ace cfgmon command in privilegedEXEC mode. To disable ACE CFGMON transactions debugging, use the no form of this command.
debug crypto ace cfgmon
no debug crypto ace cfgmon
Syntax Description This command has no arguments or keywords.
Command Default None
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SXI5
Examples The following example enables ACE CFGMON transaction debugging:
Router# debug crypto ace cfgmonACE CFGMON Transactions debugging is on
Cisco IOS Debug Command Reference - Commands A through D464
debug clns esis events through debug dbconn tcpdebug crypto ace cfgmon
debug crypto ace congestion-mgrTo enable ACE Crypto engine congestion manager debugging, use the debug crypto ace congestion-mgrcommand in privileged EXEC mode. To disable ACE Crypto engine congestion manager debugging, use theno form of this command.
debug crypto ace congestion-mgr
no debug crypto ace congestion-mgr
Syntax Description This command has no arguments or keywords.
Command Default None
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SXI5
Examples The following example enables ACE Crypto engine congestion manager debugging:
Router# debug crypto ace congestion-mgrACE Crypto Engine Congestion Manager debugging is on
Cisco IOS Debug Command Reference - Commands A through D 465
debug clns esis events through debug dbconn tcpdebug crypto ace congestion-mgr
debug crypto ace dpdTo enable ACEDPD debugging, use the debug crypto ace dpd command in privileged EXECmode. To disableACE DPD debugging, use the no form of this command.
debug crypto ace dpd
no debug crypto ace dpd
Syntax Description This command has no arguments or keywords.
Command Default None
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SXI5
Examples The following example enables ACE DPD debugging:
Router# debug crypto ace dpdACE-DPD debugging is on
Cisco IOS Debug Command Reference - Commands A through D466
debug clns esis events through debug dbconn tcpdebug crypto ace dpd
debug crypto ace errorTo enable error logging debugging, use the debug crypto ace error command in privileged EXEC mode. Todisable ACE error logging debugging, use the no form of this command.
debug crypto ace error
no debug crypto ace error
Syntax Description This command has no arguments or keywords.
Command Default None
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SXI5
Examples The following example enables error log debugging:
Router# debug crypto ace errorACE Error logging debugging is on
Cisco IOS Debug Command Reference - Commands A through D 467
debug clns esis events through debug dbconn tcpdebug crypto ace error
debug crypto ace hapiTo enable ACE HAPI transactions debugging, use the debug crypto ace hapi command in privileged EXECmode. To disable ACE HAPI transactions debugging, use the no form of this command.
debug crypto ace hapi
no debug crypto ace hapi
Syntax Description This command has no arguments or keywords.
Command Default None
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SXI5
Examples The following example enables ACE HAPI transaction debugging:
Router# debug crypto ace hapiACE HAPI transactions debugging is on
Cisco IOS Debug Command Reference - Commands A through D468
debug clns esis events through debug dbconn tcpdebug crypto ace hapi
debug crypto ace ikeaTo enable ACE IKEA transactions debugging, use the debug crypto ace ikea command in privileged EXECmode. To disable ACE IKEA transactions debugging, use the no form of this command.
debug crypto ace ikea
no debug crypto ace ikea
Syntax Description This command has no arguments or keywords.
Command Default None
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SXI5
Examples The following example enables ACE IKEA transaction debugging:
Router# debug crypto ace ikeaACE IKEA transactions debugging is on
Cisco IOS Debug Command Reference - Commands A through D 469
debug clns esis events through debug dbconn tcpdebug crypto ace ikea
debug crypto ace invspiTo enable ACE invalid SPI debugging, use the debug crypto ace invspi command in privileged EXEC mode.To disable ACE invalid SPI debugging, use the no form of this command.
debug crypto ace invspi
no debug crypto ace invspi
Syntax Description This command has no arguments or keywords.
Command Default None
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SXI5
Examples The following example enables ACE invalid SPI debugging:
Router# debug crypto ace invspiACE Invalid SPI debugging is on
Cisco IOS Debug Command Reference - Commands A through D470
debug clns esis events through debug dbconn tcpdebug crypto ace invspi
debug crypto ace ipdTo enable ACE IPD debugging, use the debug crypto ace ipd command in privileged EXECmode. To disableACE IPD debugging, use the no form of this command.
debug crypto ace ipd
no debug crypto ace ipd
Syntax Description This command has no arguments or keywords.
Command Default None
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SXI5
Examples The following example enables ACE IPD debugging:
Router# debug crypto ace ipdACE IPD debugging is on
Cisco IOS Debug Command Reference - Commands A through D 471
debug clns esis events through debug dbconn tcpdebug crypto ace ipd
debug crypto ace maceTo enable multi-ACE messages debugging, use the debug crypto ace mace command in privileged EXECmode. To disable multi-ACE messages debugging, use the no form of this command.
debug crypto ace mace
no debug crypto ace mace
Syntax Description This command has no arguments or keywords.
Command Default None
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SXI5
Examples The following example enables multi-ACE debugging:
Router# debug crypto ace maceMULTI-ACE messages debugging is on
Cisco IOS Debug Command Reference - Commands A through D472
debug clns esis events through debug dbconn tcpdebug crypto ace mace
debug crypto ace pcpTo enable ACE PCP transactions debugging, use the debug crypto ace pcp command in privileged EXECmode. To disable ACE PCP transaction debugging, use the no form of this command.
debug crypto ace pcp
no debug crypto ace pcp
Syntax Description This command has no arguments or keywords.
Command Default None
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SXI5
Examples The following example enables ACE PCP transactions debugging:
Router# debug crypto ace pcpACE PCP Transactions debugging is on
Cisco IOS Debug Command Reference - Commands A through D 473
debug clns esis events through debug dbconn tcpdebug crypto ace pcp
debug crypto ace poloTo enable ACE policy loader debugging, use the debug crypto ace polo command in privileged EXEC mode.To disable ACE policy loader debugging, use the no form of this command.
debug crypto ace polo
no debug crypto ace polo
Syntax Description This command has no arguments or keywords.
Command Default None
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SXI5
Examples The following example enables ACE policy loader debugging:
Router# debug crypto ace poloACE Policy Loader debugging is on
Cisco IOS Debug Command Reference - Commands A through D474
debug clns esis events through debug dbconn tcpdebug crypto ace polo
debug crypto ace propcfgTo enable ACE propagate configuration debugging, use the debug crypto ace propcfg command in privilegedEXEC mode. To disable ACE propagate configuration debugging, use the no form of this command.
debug crypto ace propcfg
no debug crypto ace propcfg
Syntax Description This command has no arguments or keywords.
Command Default None
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SXI5
Examples The following example enables ACE propagate configuration debugging:
Router# debug crypto ace propcfgACE Propagate Config debugging is on
Cisco IOS Debug Command Reference - Commands A through D 475
debug clns esis events through debug dbconn tcpdebug crypto ace propcfg
debug crypto ace qosTo enable ACEQoS debugging, use the debug crypto ace qos command in privileged EXECmode. To disableACE QoS debugging, use the no form of this command.
debug crypto ace qos
no debug crypto ace qos
Syntax Description This command has no arguments or keywords.
Command Default None
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SXI5
Examples The following example enables ACE QoS debugging:
Router# debug crypto ace qosACE QoS debugging is on
Cisco IOS Debug Command Reference - Commands A through D476
debug clns esis events through debug dbconn tcpdebug crypto ace qos
debug crypto ace rconTo enable ACE RCON messages debugging, use the debug crypto ace rcon command in privileged EXECmode. To disable ACE RCON messages debugging, use the no form of this command.
debug crypto ace rcon
no debug crypto ace rcon
Syntax Description This command has no arguments or keywords.
Command Default None
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SXI5
Examples The following example enables ACE RCON messages debugging:
Router# debug crypto ace rconACE RCON messages debugging is on
Cisco IOS Debug Command Reference - Commands A through D 477
debug clns esis events through debug dbconn tcpdebug crypto ace rcon
debug crypto ace redundancyTo enable ACE HA debugging, use the debug crypto ace redundancy command in privileged EXEC mode.To disable ACE HA debugging, use the no form of this command.
debug crypto ace redundancy
no debug crypto ace redundancy
Syntax Description This command has no arguments or keywords.
Command Default None
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SXI5
Examples The following example enables ACE HA debugging:
Router# debug crypto ace redundancyACE HA debugging is on
Cisco IOS Debug Command Reference - Commands A through D478
debug clns esis events through debug dbconn tcpdebug crypto ace redundancy
debug crypto ace spiTo enable ACE SPI debugging, use the debug crypto ace spi command in privileged EXEC mode. To disableACE SPI debugging, use the no form of this command.
debug crypto ace spi
no debug crypto ace spi
Syntax Description This command has no arguments or keywords.
Command Default None
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SXI5
Examples The following example enables ACE SPI debugging:
Router# debug crypto ace spiACE SPI debugging is on
Cisco IOS Debug Command Reference - Commands A through D 479
debug clns esis events through debug dbconn tcpdebug crypto ace spi
debug crypto ace statsTo enable ACE stats module debugging, use the debug crypto ace stats command in privileged EXEC mode.To disable ACE stats module debugging, use the no form of this command.
debug crypto ace stats
no debug crypto ace stats
Syntax Description This command has no arguments or keywords.
Command Default None
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SXI5
Examples The following example enables ACE stats module debugging:
Router# debug crypto ace statsACE Stats Module debugging is on
Cisco IOS Debug Command Reference - Commands A through D480
debug clns esis events through debug dbconn tcpdebug crypto ace stats
debug crypto ace syslogTo enable ACE syslog messages debugging, use the debug crypto ace syslog command in privileged EXECmode. To disable ACE syslog messages debugging, use the no form of this command.
debug crypto ace syslog
no debug crypto ace syslog
Syntax Description This command has no arguments or keywords.
Command Default None
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SXI5
Examples The following example enables ACE syslog messages debugging:
Router# debug crypto ace syslogACE Syslog messages debugging is on
Cisco IOS Debug Command Reference - Commands A through D 481
debug clns esis events through debug dbconn tcpdebug crypto ace syslog
debug crypto ace tftpTo enable ACE TFTP boot debugging, use the debug crypto ace tftp command in privileged EXEC mode.To disable ACE TFTP boot debugging, use the no form of this command.
debug crypto ace tftp
no debug crypto ace tftp
Syntax Description This command has no arguments or keywords.
Command Default None
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SXI5
Examples The following example enables ACE TFTP boot debugging:
Router# debug crypto ace tftpACE TFTP Boot debugging is on
Cisco IOS Debug Command Reference - Commands A through D482
debug clns esis events through debug dbconn tcpdebug crypto ace tftp
debug crypto ace topnTo enable ACE-TOPN-HELPER debugging, use the debug crypto ace topn command in privileged EXECmode. To disable ACE-TOPN-HELPER debugging, use the no form of this command.
debug crypto ace topn
no debug crypto ace topn
Syntax Description This command has no arguments or keywords.
Command Default None
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SXI5
Examples The following example enables ACE-TOPN-HELPER debugging:
Router# debug crypto ace topnACE-TOPN-HELPER debugging is on
Cisco IOS Debug Command Reference - Commands A through D 483
debug clns esis events through debug dbconn tcpdebug crypto ace topn
debug crypto ace warningTo enable ACE warning log debugging, use the debug crypto ace warning command in privileged EXECmode. To disable ACE warning logging debugging, use the no form of this command.
debug crypto ace warning
no debug crypto ace warning
Syntax Description This command has no arguments or keywords.
Command Default None
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(33)SXI5
Examples The following example enables ACE warning log debugging:
Router# debug crypto ace warningACE Warning logging debugging is on
Cisco IOS Debug Command Reference - Commands A through D484
debug clns esis events through debug dbconn tcpdebug crypto ace warning
debug crypto condition unmatchedTo display crypto conditional debug messages when context information is unavailable to check against debugconditions, use the debugcryptoconditionunmatchedcommand in privileged EXEC mode. To disabledebugging, use the no form of this command.
debug crypto condition unmatched [isakmp| ipsec| ikev2| engine| gdoi-group]
no debug crypto condition unmatched [isakmp| ipsec| ikev2| engine| gdoi-group]
Syntax Description (Optional) One or more of these keywords can beenabled to display debug messages for the specifiedareas. If none of these keywords are entered, debugmessages for all crypto areas will be shown.
isakmp | ipsec | ikev2 | engine | gdoi-group
Command Default Debug messages that do not have context information to match any debug conditions (filters) will not beprinted.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.3(2)T
This command was integrated into Cisco IOS Release 12.2(18)SXD.12.2(18)SXD
This command was modified. The gdoi-group keyword was replacedby the groupkeyword of thedebugcryptogdoiconditioncommand.
15.1(3)T
This command was integrated into Cisco IOS XE Release 3.8S.Cisco IOS XE Release 3.8S
Usage Guidelines After the debugcryptocondition command has been enabled, you can use thedebugcryptoconditionunmatched command to define whether the debug output is being printed when nocontext information is available in the code to check against the debug filters. For example, if the cryptoengine’s connection-ID is the filter that the debug conditions are being checked against, thedebugcryptoconditionunmatched command displays debug messages in the early negotiation phase whena connection-ID is unavailable to check against debug conditions.
Examples The following example shows how to enable debug messages for all crypto-related areas:
Router# debug crypto condition unmatched
Cisco IOS Debug Command Reference - Commands A through D 485
debug clns esis events through debug dbconn tcpdebug crypto condition unmatched
Related Commands DescriptionCommand
Defines conditional debug filters for GDOI.debug crypto gdoi condition
Defines conditional debug filters.debug crypto condition
Displays crypto debug conditions that have alreadybeen enabled in the router.
show crypto debug-condition
Displays the settings used by current SAs.show crypto ipsec sa
Displays all current IKE SAs at a peer.show crypto isakmp sa
Cisco IOS Debug Command Reference - Commands A through D486
debug clns esis events through debug dbconn tcpdebug crypto condition unmatched
debug crypto ctcpTo display information about a Cisco Tunnel Control Protocol (cTCP) session, use thedebugcryptoctcpcommand in privileged EXECmode. To turn off debugging, use the no form of this command.
debug crypto ctcp
no debug crypto ctcp
Syntax Description This command has no arguments or keywords.
Command Default Debugging is turned off.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.4(9)T
This command is supported in the Cisco IOS Release 12.2SX train. Support ina specific 12.2SX release of this train depends on your feature set, platform,and platform hardware.
12.2SX
Usage Guidelines You can use this command if a cTCP session fails to come up.
Examples The following example shows that debugging has been turned on for a cTCP session:
Router# debug crypto ctcp
Related Commands DescriptionCommand
Configures cTCP encapsulation for Easy VPN.crypto ctcp
Cisco IOS Debug Command Reference - Commands A through D 487
debug clns esis events through debug dbconn tcpdebug crypto ctcp
debug crypto engineTo display debugging messages about crypto engines, which perform encryption and decryption, use thedebugcryptoengine command in privileged EXEC mode. To disable debugging output, use the no form ofthis command.
debug crypto engine
no debug crypto engine
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.0
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines Use the debug crypto engine command to display information pertaining to the crypto engine, such as whenCisco IOS software is performing encryption or decryption operations.
The crypto engine is the actual mechanism that performs encryption and decryption. A crypto engine can besoftware or a hardware accelerator. Some platforms can have multiple crypto engines; therefore, the routerwill have multiple hardware accelerators.
Examples The following is sample output from the debugcryptoengine command. The first sample output showsmessages from a router that successfully generates Rivest, Shamir, and Adelma (RSA) keys. The secondsample output shows messages from a router that decrypts the RSA key during Internet Key Exchange (IKE)negotiation.
Router# debug crypto engine00:25:13:CryptoEngine0:generate key pair00:25:13:CryptoEngine0:CRYPTO_GEN_KEY_PAIR00:25:13:CRYPTO_ENGINE:key process suspended and continued00:25:14:CRYPTO_ENGINE:key process suspended and continuedcrRouter# debug crypto engine00:27:45:%SYS-5-CONFIG_I:Configured from console by console00:27:51:CryptoEngine0:generate alg parameter00:27:51:CRYPTO_ENGINE:Dh phase 1 status:000:27:51:CRYPTO_ENGINE:Dh phase 1 status:000:27:51:CryptoEngine0:generate alg parameter00:27:52:CryptoEngine0:calculate pkey hmac for conn id 000:27:52:CryptoEngine0:create ISAKMP SKEYID for conn id 100:27:52:Crypto engine 0:RSA decrypt with public key00:27:52:CryptoEngine0:CRYPTO_RSA_PUB_DECRYPT00:27:52:CryptoEngine0:generate hmac context for conn id 100:27:52:CryptoEngine0:generate hmac context for conn id 100:27:52:Crypto engine 0:RSA encrypt with private key
Cisco IOS Debug Command Reference - Commands A through D488
debug clns esis events through debug dbconn tcpdebug crypto engine
00:27:52:CryptoEngine0:CRYPTO_RSA_PRIV_ENCRYPT00:27:53:CryptoEngine0:clear dh number for conn id 100:27:53:CryptoEngine0:generate hmac context for conn id 100:27:53:validate proposal 000:27:53:validate proposal request 000:27:54:CryptoEngine0:generate hmac context for conn id 100:27:54:CryptoEngine0:generate hmac context for conn id 100:27:54:ipsec allocate flow 000:27:54:ipsec allocate flow 0
Related Commands DescriptionCommand
Generates RSA key pairs.crypto key generate rsa
Cisco IOS Debug Command Reference - Commands A through D 489
debug clns esis events through debug dbconn tcpdebug crypto engine
debug crypto engine accelerator logsTo enable logging of commands and associated parameters sent from the virtual private network (VPN)module driver to the VPN module hardware using a debug flag, use thedebugcryptoengineacceleratorlogscommand in privileged EXEC mode. To disable debugging output, usethe no form of this command.
debug crypto engine accelerator logs
no debug crypto engine accelerator logs
Syntax Description This command has no arguments or keywords.
Command Default The logging of commands sent from the VPN module driver to the VPN module hardware is disabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This commandwas introduced on the Cisco 1720 and Cisco 1750 routers.12.1(1)XC
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines Use the debugcryptoengineacceleratorlogscommand when encryption traffic is sent to the router and aproblem with the encryption module is suspected.
This command is intended only for Cisco TAC personnel to collect debugging information.
Examples The debugcryptoengineacceleratorlogs command uses a debug flag to log commands and associatedparameters sent from the VPN module driver to the VPN module hardware as follows:
Router# debug crypto engine accelerator logsencryption module logs debugging is on
Related Commands DescriptionCommand
Enables or disables the crypto engine accelerator ifit exists.
crypto engine accelerator
Prints information about the last 32 CGX Librarypacket processing commands, and associatedparameters sent from the VPN module driver to theVPN module hardware.
show crypto engine accelerator logs
Cisco IOS Debug Command Reference - Commands A through D490
debug clns esis events through debug dbconn tcpdebug crypto engine accelerator logs
DescriptionCommand
Prints active (in-use) entries in the platform-specificVPN module database.
show crypto engine accelerator sa-database
Displays the Cisco IOS crypto engine of your router.show crypto engine configuration
Cisco IOS Debug Command Reference - Commands A through D 491
debug clns esis events through debug dbconn tcpdebug crypto engine accelerator logs
debug crypto engine ism-vpnTo enable debugging for a Cisco VPN Internal Service Module (ISM), use the debug crypto engine ism-vpncommand in privileged EXEC mode. To disable debugging, use the no form of this command.
debug crypto engine ism-vpn[init| interrupt| polo[detail| dump]| shim[detail]| tftp]
no debug crypto engine ism-vpn[init| interrupt| polo[detail| dump]| shim[detail]| tftp]
Syntax Description (Optional) Enables initial state (INIT state) debugging for an Application ControlEngine (ACE) appliance in Cisco VPN ISM.
init
(Optional) Enables interrupt service debugging.interrupt
(Optional) Enables VPN ISM polo debugging.polo
(Optional) Enables detailed debugging.detail
(Optional) Enables packet dump polo debugging.dump
(Optional) Enables VPN ISM shim layer debugging.shim
(Optional) Enables debugging for TFTP download or upload on the Cisco VPNISM.
tftp
Command Default Cisco VPN ISM debugging is not enabled.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.15.3(2)T
Examples The following example shows how to enable initial state (INIT state) debugging.Device# debug crypto engine ism-vpn initINIT debugging is on
Related Commands DescriptionCommand
Enables debugging for Cisco VPN ISM SSL.debug crypto engine ism-vpn ssl
Cisco IOS Debug Command Reference - Commands A through D492
debug clns esis events through debug dbconn tcpdebug crypto engine ism-vpn
DescriptionCommand
Enables debugging for Cisco VPN ISM traffic.debug crypto engine ism-vpn traffic
Enables debugging for specific traffic in a Cisco VPNISM.
debug crypto engine ism-vpn traffic selector
Displays IPsec encryption statistics and error countersfor the onboard hardware accelerator of a device, theIPsec VPN SPA, or the Cisco VPN ISM.
show crypto engine accelerator statistic
Cisco IOS Debug Command Reference - Commands A through D 493
debug clns esis events through debug dbconn tcpdebug crypto engine ism-vpn
debug crypto engine ism-vpn sslTo enable debugging for Secure Sockets Layer (SSL) in a Cisco VPN Internal Service Module (VPN ISM),use the debug crypto engine ism-vpn ssl command in privileged EXEC mode. To disable debugging, usethe no form of this command.
debug crypto engine ism-vpn ssl{context rule-number session-id| direction number}
no debug crypto engine ism-vpn ssl{context rule-number session-id| direction number}
Syntax Description Enables debugging for a specific SSL depending on the rule or the session. Therange for the rule number is from 1 to 10. The range for the session ID is 0 to4294967294.
context rule-numbersession-id
Enables debugging for packets that are in the inbound or outbound direction.The range for the direction number is from 0 to 3, where 0 indicates the inboundand outbound direction, 1 indicates encryption , 2 indicates decryption, and 3indicates exceptions.
direction number
Command Default Cisco VPN ISM SSL debugging is not enabled.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.15.3(2)T
Examples The following example shows how to enable debugging of rule 3 and context 1:Device# debug crypto engine ism-vpn ssl context 3 1ISM-VPN Enable rule 3, ctx: 1
ISM-VPN SSL Context debugging is on
Related Commands DescriptionCommand
Enables debugging for a Cisco VPN ISM.debug crypto engine ism-vpn
Enables debugging for Cisco VPN ISM traffic.debug crypto engine ism-vpn traffic
Enables debugging for specific traffic in a Cisco VPNISM.
debug crypto engine ism-vpn traffic selector
Cisco IOS Debug Command Reference - Commands A through D494
debug clns esis events through debug dbconn tcpdebug crypto engine ism-vpn ssl
DescriptionCommand
Displays IPsec encryption statistics and error countersfor the onboard hardware accelerator of a device, theIPsec VPN SPA, or Cisco VPN ISM.
show crypto engine accelerator statistic
Cisco IOS Debug Command Reference - Commands A through D 495
debug clns esis events through debug dbconn tcpdebug crypto engine ism-vpn ssl
debug crypto engine ism-vpn trafficTo enable debugging for Cisco VPN Internal Service Module (ISM) traffic, use the debug crypto engineism-vpn traffic command in privileged EXECmode. To disable debugging, use the no form of this command.
debug crypto engine ism-vpn traffic{all| detail| exception number| inbound| outbound| selective| vam}
no debug crypto engine ism-vpn traffic{all| detail| exception number| inbound| outbound| selective|vam}
Syntax Description Enables debugging for all traffic that flows to the Cisco VPN ISM.all
Enables detailed debugging for all traffic that flows to the Cisco VPN ISM.detail
Enables debugging for specified exceptions in the traffic. The range is from 0to 54. 0 enables debugging for all exceptions.
exception number
Enables debugging for inbound traffic.inbound
Enables debugging for outbound traffic.outbound
Enables selective rules for the traffic on the Cisco VPN ISM.selective
Enables debugging for the Cisco VPN Acceleration Module (VAM) in theCisco VPN ISM.
vam
Command Default Cisco VPN ISM traffic debugging is not enabled.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.15.3(2)T
Examples The following shows how to enable debugging for all exceptions in the traffic:Device# debug crypto engine ism-vpn traffic exception 0ISM-VPN Traffic Detail debugging is on
Related Commands DescriptionCommand
Enables debugging for a Cisco VPN ISM.debug crypto engine ism-vpn
Cisco IOS Debug Command Reference - Commands A through D496
debug clns esis events through debug dbconn tcpdebug crypto engine ism-vpn traffic
DescriptionCommand
Enables debugging for specific traffic in a Cisco VPNISM.
debug crypto engine ism-vpn traffic selector
Enables debugging for Cisco VPN ISM SSL.debug crypto engine ism-vpn ssl
Displays IPsec encryption statistics and error countersfor the onboard hardware accelerator of a device, theIPsec VPN SPA, or the Cisco VPN ISM.
show crypto engine accelerator statistic
Cisco IOS Debug Command Reference - Commands A through D 497
debug clns esis events through debug dbconn tcpdebug crypto engine ism-vpn traffic
debug crypto engine ism-vpn traffic selectorTo enable debug rules for specific traffic in Cisco VPN Internal Service Module (ISM), use the debug cryptoengine ism-vpn traffic selector command in privileged EXEC mode. To disable debugging, use the no formof this command.
debug crypto engine ism-vpn traffic selector{ipv4| ipv6}{disable rule-number| enable rule-numbersource-ip-address source-address-mask destination-ip-address destination-address-mask protocols}
no debug crypto engine ism-vpn traffic selector{ipv4| ipv6}{disable rule-number| enable rule-numbersource-ip-address source-address-mask destination-ip-address destination-address-mask protocols}
Syntax Description Enables debugging rules for IPv4 addresses.ipv4
Enables debugging rules for IPv6 addresses.ipv6
Enables debugging rules are disabled.disable
Enables debugging rules are enabled.enable
A specific rule. The range is from 1 to 10.rule-number
Source IP address and network mask of the traffic for whichrules must be enabled or disabled.
source-ip-address source-address-mask
Destination IP address and network mask of the traffic forwhich rules must be enabled or disabled.
destination-ip-address destination-address-mask
Protocols in the source and destination IP addresses of thetraffic for which rules must be enabled or disabled. Therange is from 0 to 155. 0 denotes all protocols.
protocols
Command Default Cisco VPN ISM selective traffic debugging is not enabled.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.15.3(2)T
Cisco IOS Debug Command Reference - Commands A through D498
debug clns esis events through debug dbconn tcpdebug crypto engine ism-vpn traffic selector
Examples The following example shows how to enable the debugging of rule 0 for all protocols from source address10.0.0.1 255.255.255.0 and destination address 10.0.0.2 255.255.255.0:Device# debug crypto engine ism-vpn traffic selector enable 0 10.0.0.1 255.255.255.0 10.0.0.2255.255.255.0 1ISM-VPN Enable rule 0, s: 10.0.0.1 d: 10.0.0.2 p: 1
Related Commands DescriptionCommand
Enables debugging for a Cisco VPN ISM.debug crypto engine ism-vpn
Enables debugging for Cisco VPN ISM traffic.debug crypto engine ism-vpn traffic
Enables debugging for Cisco VPN ISM SSL.debug crypto engine ism-vpn ssl
Displays IPsec encryption statistics and error countersfor the onboard hardware accelerator of a device, theIPsec VPN SPA, or Cisco VPN ISM.
show crypto engine accelerator statistic
Cisco IOS Debug Command Reference - Commands A through D 499
debug clns esis events through debug dbconn tcpdebug crypto engine ism-vpn traffic selector
debug crypto errorTo enable error debugging for a crypto area, use the debugcryptoerrorcommand in privileged EXEC mode.To disable crypto error debugging, use the no form of this command.
debug crypto {isakmp| ipsec| engine} error
no debug crypto {isakmp| ipsec| engine} error
Syntax Description Debugmessages are shown for Internet Key Exchange(IKE)-related error operations only.
isakmp
Debug messages are shown for IP Security(IPSec)-related error operations only.
ipsec
Debug messages are shown for crypto engine-relatederror operations only.
engine
Command Default Crypto error debugging is not enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.3(2)T
This command was integrated into Cisco IOS Release 12.2(!8)SXD.12.2(18)SXD
Usage Guidelines Thedebugcryptoerrorcommand will display only error-related debug messages; that is, an error debug willnot be shown if the operation is functioning properly.
This command should be used when debug conditions cannot be determined; for example, enable this commandwhen a random, small subset of IKE peers is failing negotiation.
The global crypto command-line interfaces (CLIs) (the debugcryptoisakmp, debugcryptoipsec, anddebugcryptoengine commands) will override the debugcryptoerror command. Thus, this commandshould not be used in conjunction with the global CLIs because you may overwhelm the router.
Note
Cisco IOS Debug Command Reference - Commands A through D500
debug clns esis events through debug dbconn tcpdebug crypto error
Debug message filtering for crypto hardware engines is not supported.Note
Examples The following example shows how to enable IPSec-related error messages:
Router# debug crypto error ipsec error
Cisco IOS Debug Command Reference - Commands A through D 501
debug clns esis events through debug dbconn tcpdebug crypto error
debug crypto gdoiTo display information about a GroupDomain of Interpretation (GDOI) configuration, use the debugcryptogdoicommand in privileged EXEC mode. To disable crypto GDOI debugging, use the no form of this command.
debug crypto gdoi [all-features [all-levels]| detail| error| event| gm| infrastructure| ks [acls| coop]| packet|replay| terse]
no debug crypto gdoi [all-features [all-levels]| detail| error| event| gm| infrastructure| ks [acls| coop]|packet| replay| terse]
Syntax Description (Optional) Displays debug data for all features inGDOI. This consists of rekey, cooperative key server,replay, and registration information (for KSs) andrekey, registration, and replay information (for GMs).
all-features
(Optional) Displays all debug levels (detail, error,event, packet, and terse).
all-levels
(Optional) Displays detailed debug information.detail
(Optional) Displays information about error debugs.error
(Optional) Displays user-level information.event
(Optional) Displays information about groupmembers.
gm
(Optional) Displays information about the GDOIinfrastructure.
infrastructure
(Optional) Displays information about key servers.ks
(Optional) Displays information about implementationof ACLs.
acls
(Optional) Displays information about cooperativekey servers.
coop
(Optional) Displays information about packet-leveldebugs (administrator-level information).
packet
(Optional) Displays information about the pseudotimestamp that is contained in a packet.
replay
(Optional) Displays lowest-level debugs(message-level information).
terse
Cisco IOS Debug Command Reference - Commands A through D502
debug clns esis events through debug dbconn tcpdebug crypto gdoi
The detail, error, event, packet, and tersekeywords can be used with the featurekeywords (for example, gmerror,infrastructureerror,kscoopevent,replayerror).
Note
Command Default Debugging is turned off.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.4(6)T
The detail, error, event, gm, infrastructure, ks, coop, packet, replay,andtersekeywords were added.
12.4(11)T
This command was integrated into Cisco IOS XE Release 2.3.Cisco IOS XE Release 2.3
This command was modified. The acls and replay keywords wereremoved. The all-features and all-levels keywords were added.
15.1(3)T
This command was modified. The acls and replay keywords wereremoved. The all-features and all-levels keywords were added.
Cisco IOS XE Release 3.8S
Usage Guidelines Using this command displays various GDOI debugs. For debugging information for cooperative key servers,use the debugcryptogdoikscoop command.
If you do not specify a feature (using the all-features, registration, rekey, replay, coop, or infrastructurekeywords), then messages for all features are displayed. If you do not specify a level (using the detail, error,event, packet, and terse keywords), then the terse level (which also includes the error level) is used.
You can use this command in conjunction with the debugcryptogdoiconditioncommand. When these twocommands are used together, only those messages that pass through any debug level or feature (specified bythe debugcryptogdoicommand) and pass through any condition (specified by thedebugcryptogdoiconditioncommand) are displayed.
Examples The following example shows group member registration debug output:
Router# debug crypto gdoi00:00:40: GDOI:(0:0:N/A:0):GDOI group diffint00:00:40: %CRYPTO-5-GM_REGSTER: Start registration for group diffint using address 10.0.3.100:00:40: %CRYPTO-6-ISAKMP_ON_OFF: ISAKMP is ON00:00:40: GDOI:(0:1001:HW:0:3333):beginning GDOI exchange, M-ID of 116714507500:00:40: GDOI: Group Number is 333300:00:40: GDOI:(0:1001:HW:0:3333):GDOI: GDOI ID sent successfully
Cisco IOS Debug Command Reference - Commands A through D 503
debug clns esis events through debug dbconn tcpdebug crypto gdoi
00:00:40: GDOI:(0:1001:HW:0:3333):processing GDOI SA Payload, message ID + 116714507500:00:40: GDOI:(0:1001:HW:0):processing GDOI SA KEK Payload00:00:40: GDOI:(0:0:N/A:0): KEK_ALGORITHM 500:00:40: GDOI:(0:0:N/A:0): KEY_LENGTH 2400:00:40: GDOI:(0:0:N/A:0): KEY_LIFETIME 29900:00:40: GDOI:(0:0:N/A:0): SIG_HASH_ALG 200:00:40: GDOI:(0:0:N/A:0): SIG_ALG 100:00:40: GDOI:(0:0:N/A:0): SIG_KEY_LEN 9400:00:40: GDOI:(0:0:N/A:0): Completed KEK Processing00:00:40: GDOI:(0:1001:HW:0):processing GDOI SA TEK Payload00:00:40: GDOI:(0:1001:HW:0:3333): Completed TEK Processing00:00:40: GDOI:(0:1001:HW:0):processing GDOI SA TEK Payload00:00:40: GDOI:(0:1001:HW:0:3333): Completed TEK Processing00:00:40: GDOI:(0:1001:HW:0:3333):GDOI ACK sent successfully by GM00:00:40: GDOI:received payload type 1800:00:40: GDOI:(0:1001:HW:0:3333):processing GDOI Seq Payload, message_id 116714507500:00:40: GDOI:(0:1001:HW:0:3333):Completed SEQ Processing for seq 000:00:40: GDOI:received payload type 1700:00:40: GDOI:(0:1001:HW:0:3333):processing GDOI KD Payload, message_id 116714507500:00:40: GDOI:(0:1001:HW:0:3333):processing GDOI Key Packet, message_id 3864933600:00:40: GDOI:(0:1001:HW:0:3333):procesing TEK KD: spi is 56165461, spi00:00:40: GDOI:(0:1001:HW:0:3333):TEK Integrity Key 20 bytes00:00:40: GDOI:(0:1001:HW:0:3333):Completed KeyPkt Processing00:00:40: GDOI:(0:1001:HW:0:3333):processing GDOI Key Packet, message_id 3864933600:00:40: GDOI:(0:1001:HW:0:3333):procesing TEK KD: spi is 56165522, spi00:00:40: GDOI:(0:1001:HW:0:3333):TEK Integrity Key 20 bytes00:00:40: GDOI:(0:1001:HW:0:3333):Completed KeyPkt Processing00:00:40: GDOI:(0:1001:HW:0:3333):processing GDOI Key Packet, message_id 3864933600:00:40: GDOI:(0:1001:HW:0:3333): Processing KEK KD00:00:40: GDOI:(0:1001:HW:0:3333):KEK Alg Key 32 bytes00:00:40: GDOI:(0:1001:HW:0:3333):KEK Sig Key 94 bytes00:00:40: GDOI:(0:1001:HW:0:3333):Completed KeyPkt Processing00:00:40: %GDOI-5-GM_REGS_COMPL: Registration complete for group diffint using address10.0.3.1enc(config-if)#00:00:40: GDOI:(0:0:N/A:0):Registration installed 2 new ipsec SA(s) for group diffint.
The following output example shows key server registration debugs:
Router# debug crypto gdoi00:00:40: GDOI:(0:1001:HW:0):processing GDOI ID payload, message ID = 116714507500:00:40: GDOI:(0:1001:HW:0):The GDOI ID is a Number: 333300:00:40: GDOI:(0:0:N/A:0): Adding KEK Policy to the current ks_group00:00:40: GDOI:(0:0:N/A:0):Setting MULTICAST TEK rekey lifetime 3000:00:40: GDOI:(0:0:N/A:0):Setting MULTICAST TEK rekey lifetime 3000:00:40: GDOI:(0:1001:HW:0:3333):GDOI SA sent successfully by KS00:00:40: GDOI:(0:1001:HW:0:3333):GDOI KD sent successfully by KSThe following output example shows group member rekey debugs:
Router# debug crypto gdoi00:02:00: GDOI:(0:1002:HW:0):Received Rekey Message!00:02:00: GDOI:(0:1002:HW:0):Signature Valid!00:02:00: GDOI:received payload type 1800:02:00: GDOI:(0:1002:HW:0):processing GDOI Seq Payload, message_id 000:02:00: GDOI:(0:1002:HW:0):Completed SEQ Processing for seq 800:02:00: GDOI:(0:1002:HW:0):processing GDOI SA Payload, message ID + 000:02:00: GDOI:(0:1002:HW:0):processing GDOI SA KEK Payload00:02:00: GDOI:(0:1002:HW:0): KEK_ALGORITHM 500:02:00: GDOI:(0:1002:HW:0): KEY_LENGTH 2400:02:00: GDOI:(0:1002:HW:0): KEY_LIFETIME 21900:02:00: GDOI:(0:1002:HW:0): SIG_HASH_ALG 200:02:00: GDOI:(0:1002:HW:0): SIG_ALG 100:02:00: GDOI:(0:1002:HW:0): Completed KEK Processing00:02:00: GDOI:(0:1002:HW:0):processing GDOI SA TEK Payload00:02:00: GDOI:(0:1002:HW:0): Completed TEK Processing00:02:00: GDOI:(0:1002:HW:0):processing GDOI SA TEK Payload00:02:00: GDOI:(0:1002:HW:0): Completed TEK Processing00:02:00: GDOI:received payload type 1700:02:00: GDOI:(0:1002:HW:0):processing GDOI KD Payload, message_id 000:02:00: GDOI:(0:1002:HW:0):processing GDOI Key Packet, message_id 3864933600:02:00: GDOI:(0:1002:HW:0):procesing TEK KD: spi is 49193284, spi
Cisco IOS Debug Command Reference - Commands A through D504
debug clns esis events through debug dbconn tcpdebug crypto gdoi
00:02:00: GDOI:(0:1002:HW:0):TEK Integrity Key 20 bytes00:02:00: GDOI:(0:1002:HW:0):Completed KeyPkt Processingenc(config-if)#00:02:00: GDOI:(0:1002:HW:0):processing GDOI Key Packet, message_id 3864933600:02:00: GDOI:(0:1002:HW:0):procesing TEK KD: spi is 49193345, spi00:02:00: GDOI:(0:1002:HW:0):TEK Integrity Key 20 bytes00:02:00: GDOI:(0:1002:HW:0):Completed KeyPkt Processing00:02:00: GDOI:(0:1002:HW:0):processing GDOI Key Packet, message_id 3864933600:02:00: GDOI:(0:1002:HW:0): Processing KEK KD00:02:00: GDOI:(0:1002:HW:0):Completed KeyPkt Processing
Cisco IOS Debug Command Reference - Commands A through D 505
debug clns esis events through debug dbconn tcpdebug crypto gdoi
debug crypto gdoi conditionTo configure conditional filters (based on groups and peers) for GDOI debugging, use thedebugcryptogdoiconditioncommand in privileged EXEC mode. To disable conditional filters, use the noform of this command.
debug crypto gdoi condition {[group group-name] [peer {address ipv4 ipv4-address-of-peer| hostnameipv4 ipv4-hostname}]| reset| unmatched}
no debug crypto gdoi condition {[group group-name] [peer {address ipv4 ipv4-address-of-peer| hostnameipv4 ipv4-hostname}]| reset| unmatched}
Syntax Description (Optional) Displays information for a specific group.group group-name
(Optional) Displays information for a specific IPv4peer.
address ipv4 ipv4-address-of-peer
(Optional) Displays information for a specific IPv4host.
hostname ipv4 ipv4-hostname
(Optional) Removes all debugging conditions.reset
(Optional) Displays debug messages if no context isavailable.
unmatched
Command Default Conditional bugging is turned off.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.15.1(3)T
This command was integrated into Cisco IOS XE Release 3.8S.Cisco IOS XE Release 3.8S
Usage Guidelines This command lets you filter the number of debug messages to make it easier to identify the problem of aparticular groupmember (GM). This command is useful whenmany (such as thousands of) GMs are registeredto a key server on which debugging is enabled.
You can use this command in conjunction with the debugcryptogdoicommand. When these two commandsare used together, only those messages that pass through any debug level or feature (specified by the
Cisco IOS Debug Command Reference - Commands A through D506
debug clns esis events through debug dbconn tcpdebug crypto gdoi condition
debugcryptogdoicommand) and pass through any condition (specified by thedebugcryptogdoiconditioncommand) are displayed.
You can use this command multiple times to configure conditional debugging for any number of GMs. Youcan have more than one group configured and more than one GM registered to each group.
If no GM is specified, debug messages will appear for all GMs (this occurs automatically when all conditionalfiltering is removed).
Also, this command lets you filter per cooperative key server on each key server. This command is usefulwhen there are many key servers in a system.
The unmatched keyword displays messages when there is insufficient information to perform conditionaldebugging. The unmatched keyword is enabled for the error, terse, and event debug levels.
To remove the debug messages for a GM or a key server, use the no form of the same command.
Examples The following example shows how to configure a conditional filter for a GDOI group named group1:
Router# debug crypto gdoi condition group group1The following output example shows how to configure a conditional filter for IPv4 peers:
Router# debug crypto gdoi condition peer
Related Commands DescriptionCommand
Defines conditional debug filters for IP Security(IPSec) tunnels.
debug crypto condition
Cisco IOS Debug Command Reference - Commands A through D 507
debug clns esis events through debug dbconn tcpdebug crypto gdoi condition
debug crypto haTo display crypto high availability debugging information, use the debugcryptohacommand in privilegedEXEC mode. To disable debugging messages, use the no form of this command.
debug crypto ha
no debug crypto ha
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.3(11)T
Examples The following example is sample output from the debugcryptoha command:
Router# debug crypto ha
Active router:Router# show debug
Cryptographic Subsystem:Crypto High Availability Manager debugging is on
vrf-lite-R1#*Sep 28 21:27:50.899:Sending IKE Add SA Message*Sep 28 21:27:50.899:HA Message 0:flags=0x01 len=394 HA_IKE_MSG_ADD_SA (2)*Sep 28 21:27:50.899: ID:04000003*Sep 28 21:27:50.899: attr HA_IKE_ATT_MY_COOKIE (2) len 8*Sep 28 21:27:50.899: 9B 1A 76 AA 99 11 1A 1F*Sep 28 21:27:50.899: attr HA_IKE_ATT_HIS_COOKIE (3) len 8*Sep 28 21:27:50.899: E2 A2 A3 5F 53 1D EA 15*Sep 28 21:27:50.899: attr HA_IKE_ATT_SRC (4) len 4*Sep 28 21:27:50.899: 04 00 00 05*Sep 28 21:27:50.899: attr HA_IKE_ATT_DST (5) len 4*Sep 28 21:27:50.899: 04 00 00 03*Sep 28 21:27:50.899: attr HA_IKE_ATT_PEER_PORT (6) len 2*Sep 28 21:27:50.899: 01 F4*Sep 28 21:27:50.899: attr HA_IKE_ATT_F_VRF (7) len 1*Sep 28 21:27:50.899: 00*Sep 28 21:27:50.899: attr HA_IKE_ATT_INIT_OR_RESP (8) len 1*Sep 28 21:27:50.899: 00*Sep 28 21:27:50.899: attr HA_IKE_ATT_NAT_DISCOVERY (9) len 1*Sep 28 21:27:50.899: 02*Sep 28 21:27:50.899: attr HA_IKE_ATT_IDTYPE (38) len 1*Sep 28 21:27:50.899: 01*Sep 28 21:27:50.899: attr HA_IKE_ATT_PROTOCOL (39) len 1*Sep 28 21:27:50.899: 11*Sep 28 21:27:50.899: attr HA_IKE_ATT_PORT (40) len 2*Sep 28 21:27:50.899: 01 F4*Sep 28 21:27:50.899: attr HA_IKE_ATT_ADDR (41) len 4*Sep 28 21:27:50.899: 04 00 00 05*Sep 28 21:27:50.899: attr HA_IKE_ATT_MASK (42) len 4*Sep 28 21:27:50.899: 00 00 00 00
Cisco IOS Debug Command Reference - Commands A through D508
debug clns esis events through debug dbconn tcpdebug crypto ha
*Sep 28 21:27:50.899: attr HA_IKE_ATT_ID_STR (44) len 4*Sep 28 21:27:50.899: 00 00 00 00*Sep 28 21:27:50.899: attr HA_IKE_ATT_PEERS_CAPABILITIES (11) len 4*Sep 28 21:27:50.899: 00 00 07 7F*Sep 28 21:27:50.899: attr HA_IKE_ATT_MY_CAPABILITIES (12) len 4*Sep 28 21:27:50.899: 00 00 07 7F*Sep 28 21:27:50.899: attr HA_IKE_ATT_STATE_MASK (13) len 4*Sep 28 21:27:50.899: 00 00 27 FF...
Related Commands DescriptionCommand
Enables debugging messages for IPSec highavailability.
debug crypto ipsec ha
Enables debugging messages for ISAKMP highavailability.
debug crypto isakmp ha
Cisco IOS Debug Command Reference - Commands A through D 509
debug clns esis events through debug dbconn tcpdebug crypto ha
debug crypto ipv6 ipsecTo display IP Security (IPSec) events for IPv6 networks, use the debug crypto ipv6 ipsec command inprivileged EXEC mode. To disable debugging output, use the no form of this command.
debug crypto ipv6 ipsec
no debug crypto ipv6 ipsec
Syntax Description This command has no arguments or keywords.
Command Default Debugging for IPv6 IPSec events is not enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.3(4)T
This commandwas introduced onCiscoASR 1000 Series Routers.Cisco IOS XE Release 2.1
Usage Guidelines Use this command to display IPSec events while setting up or removing policy definitions during OSPFconfiguration.
Examples The following example enables the display of IPSec events for IPv6 networks:
Router# debug crypto ipv6 ipsec
Related Commands DescriptionCommand
Displays debugging messages about crypto engines,which perform encryption and decryption.
debug crypto engine
Displays debug messages for IPv6 packets allowingyou to see the contents of packets outbound from aCisco router when the remote node is not a Cisconode.
debug crypto ipv6 packet
Displays communication between the client and IPSecduring policy setup and removal processes.
debug crypto socket
Cisco IOS Debug Command Reference - Commands A through D510
debug clns esis events through debug dbconn tcpdebug crypto ipv6 ipsec
DescriptionCommand
Displays the interaction between OSPF and IPSec,including creation or removal of policies.
debug ipv6 ospf authentication
Cisco IOS Debug Command Reference - Commands A through D 511
debug clns esis events through debug dbconn tcpdebug crypto ipv6 ipsec
debug crypto ipv6 packetTo display the contents of IPv6 packets, use the debug crypto ipv6 packet command in privileged EXECmode. To disable debugging output, use the no form of this command.
debug crypto ipv6 packet
no debug crypto ipv6 packet
Syntax Description This command has no arguments or keywords.
Command Default Debugging for IPv6 IPSec packets is not enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.3(4)T
This commandwas introduced onCiscoASR 1000 Series Routers.Cisco IOS XE Release 2.1
Usage Guidelines Consult Cisco Technical Support before using this command.
Use this command to display the contents of IPv6 packets. This command is useful when the remote node isnot a Cisco device and communication between the Cisco and non-Cisco router cannot be established. Thiscommand enables you to look at the contents of the packets outbound from the Cisco router.
This command examines the content of every IPv6 packet and may slow network performance.
Examples This example shows the ouptut of each packet when the debug crypto ipv6 packet command is enabled:
Router# debug crypto ipv6 packetCrypto IPv6 IPSEC packet debugging is onRouter#*Oct 30 16:57:06.330:IPSECv6:before Encapsulation of IPv6 packet:0E37A7C0: 6E000000 00285901 n....(Y.0E37A7D0:FE800000 00000000 020A8BFF FED42C1D ~...........~T,.0E37A7E0:FF020000 00000000 00000000 00000005 ................0E37A7F0:03010028 01010104 00000001 8AD80000 ...(.........X..0E37A800:00000006 01000013 000A0028 0A0250CF ...........(..PO0E37A810:01010104 0A0250CF ......PO*Oct 30 16:57:06.330:IPSECv6:Encapsulated IPv6 packet:0E37A7B0:6E000000 00403301 FE800000 00000000 n....@3.~.......0E37A7C0:020A8BFF FED42C1D FF020000 00000000 ....~T,.........0E37A7D0:00000000 00000005 59040000 000022B8 ........Y....."80E37A7E0:0000001A 38AB1ED8 04C1C6FB FF1248CF ....8+.X.AF{..HO0E37A7F0:03010028 01010104 00000001 8AD80000 ...(.........X..
Cisco IOS Debug Command Reference - Commands A through D512
debug clns esis events through debug dbconn tcpdebug crypto ipv6 packet
0E37A800:00000006 01000013 000A0028 0A0250CF ...........(..PO0E37A810:01010104 0A0250CF ......PO*Oct 30 16:57:11.914:IPSECv6:Before Decapsulation of IPv6 packet:0E004A50: 6E000000 00403301 [email protected]:FE800000 00000000 023071FF FE7FE81D ~........0q.~.h.0E004A70:FF020000 00000000 00000000 00000005 ................0E004A80:59040000 000022B8 00001D88 F5AC68EE Y....."8....u,hn0E004A90:1AC00088 947C6BF2 03010028 0A0250CF .@...|kr...(..PO0E004AA0:00000001 E9080000 00000004 01000013 ....i...........0E004AB0:000A0028 0A0250CF 01010104 01010104 ...(..PO........0E004AC0:*Oct 30 16:57:11.914:IPSECv6:Decapsulated IPv6 packet:0E004A70:6E000000 00285901 FE800000 00000000 n....(Y.~.......0E004A80:023071FF FE7FE81D FF020000 00000000 .0q.~.h.........0E004A90:00000000 00000005 03010028 0A0250CF ...........(..PO0E004AA0:00000001 E9080000 00000004 01000013 ....i...........0E004AB0:000A0028 0A0250CF 01010104 01010104 ...(..PO........0E004AC0:*Oct 30 16:57:16.330:IPSECv6:before Encapsulation of IPv6 packet:0E003DC0: 6E000000 00285901 n....(Y.0E003DD0:FE800000 00000000 020A8BFF FED42C1D ~...........~T,.0E003DE0:FF020000 00000000 00000000 00000005 ................0E003DF0:03010028 01010104 00000001 8AD80000 ...(.........X..0E003E00:00000006 01000013 000A0028 0A0250CF ...........(..PO0E003E10:01010104 0A0250CF ......PO*Oct 30 16:57:16.330:IPSECv6:Encapsulated IPv6 packet:0E003DB0:6E000000 00403301 FE800000 00000000 n....@3.~.......0E003DC0:020A8BFF FED42C1D FF020000 00000000 ....~T,.........0E003DD0:00000000 00000005 59040000 000022B8 ........Y....."80E003DE0:0000001B F8E3C4E2 4CC4B690 DDF32B5C ....xcDbLD6.]s+\0E003DF0:03010028 01010104 00000001 8AD80000 ...(.........X..0E003E00:00000006 01000013 000A0028 0A0250CF ...........(..PO0E003E10:01010104 0A0250CF ......PO
Related Commands DescriptionCommand
Displays debugging messages about crypto engines,which perform encryption and decryption.
debug crypto engine
Displays IPSec events for IPv6 networks.debug crypto ipv6 ipsec
Displays communication between the client and IPSecduring policy setup and removal processes.
debug crypto socket
Cisco IOS Debug Command Reference - Commands A through D 513
debug clns esis events through debug dbconn tcpdebug crypto ipv6 packet
debug crypto ikev2To enable Internet Key Exchange Version 2(IKEv2) debug messages, use the debugcryptoikev2commandin privileged EXEC mode.
debug crypto ikev2 [error| terse| event| packet| detail]
no debug crypto ikev2 [error| terse| event| packet| detail]
Syntax Description (Optional) Enables debugmessages capturing IKEv2errors.
error
(Optional) Enables debugmessages capturing IKEv2message exchanges.
terse
(Optional) Enables debugmessages capturing IKEv2packet description, contents, and policy matching.
event
(Optional) Enables debugmessages capturing IKEv2packet dump.
packet
(Optional) Enables debugmessages capturing IKEv2state machine events.
detail
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.15.1(1)T
This command was integrated into Cisco IOS XE Release 3.3S.Cisco IOS XE Release 3.3S
Usage Guidelines Use this command to enable IKEv2 debug messages. IKEv2 uses following debug levels.
• Level 1--error
• Level 2--terse
• Level 3--event
• Level 4--packet
• Level 5--detail
Cisco IOS Debug Command Reference - Commands A through D514
debug clns esis events through debug dbconn tcpdebug crypto ikev2
Level 1 is the lowest level and is least verbose and level 5 is highest level. Enabling debug at a higherlevel enables debug at all lower levels. You can selectively disable a debug level and enable conditionaldebug using the debugcryptocondition command.
Note
Examples The following example shows that the IKEv2 debugging is enabled:
Router# debug crypto ikev2debugging is on
Related Commands DescriptionCommand
Enables conditional debugging.debug crypto condition
Cisco IOS Debug Command Reference - Commands A through D 515
debug clns esis events through debug dbconn tcpdebug crypto ikev2
debug crypto ipsecTo display IP security (IPsec) events, use the debugcryptoipseccommand in privileged EXEC mode. Todisable debugging output, use the no form of this command.
debug crypto ipsec
no debug crypto ipsec
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC (#)
Command History ModificationsRelease
This command was introduced.11.3 T
This command was integrated into Cisco IOS XE Release 2.6.Cisco IOS XE Release 2.6
Examples The following is sample output from the debugcryptoipsec command. In this example, security associations(SAs) have been successfully established.
Router# debug crypto ipsecIPsec requests SAs between 172.21.114.123 and 172.21.114.67, on behalf of thepermitiphost172.21.114.123host172.21.114.67 command. IPsec is configured to first use the set esp-desw/esp-md5-hmac, but it will also use ah-sha-hmac on a secondary basis.
00:24:30: IPSEC(sa_request): ,(key eng. msg.) src= 172.21.114.123, dest= 172.21.114.67,src_proxy= 172.21.114.123/255.255.255.255/0/0 (type=1),dest_proxy= 172.21.114.67/255.255.255.255/0/0 (type=1),protocol= ESP, transform= esp-des esp-md5-hmac ,lifedur= 120s and 4608000kb,spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x4
00:24:30: IPSEC(sa_request): ,(key eng. msg.) src= 172.21.114.123, dest= 172.21.114.67,src_proxy= 172.21.114.123/255.255.255.255/0/0 (type=1),dest_proxy= 172.21.114.67/255.255.255.255/0/0 (type=1).,protocol= AH, transform= ah-sha-hmac ,lifedur= 120s and 4608000kb,spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x0.
Internet Key Exchange (IKE) prompts for Service Provider Interfaces (SPIs) from IPsec. For inbound securityassociations, IPsec controls its own SPI space.
00:24:34: IPSEC(key_engine): got a queue event...00:24:34: IPSEC(spi_response): getting spi 302974012ld for SA
from 172.21.114.67 to 172.21.114.123 for prot 300:24:34: IPSEC(spi_response): getting spi 525075940ld for SA
from 172.21.114.67 to 172.21.114.123 for prot 2
Cisco IOS Debug Command Reference - Commands A through D516
debug clns esis events through debug dbconn tcpdebug crypto ipsec
IKE will verify whether IPsec accepts the SA proposal. In this example, it is the SA proposal sent by the localIPsec that is accepted first.
00:24:34: IPSEC(validate_proposal_request): proposal part #1,(key eng. msg.) dest= 172.21.114.67, src= 172.21.114.123,dest_proxy= 172.21.114.67/255.255.255.255/0/0 (type=1),src_proxy= 172.21.114.123/255.255.255.255/0/0 (type=1),protocol= ESP, transform= esp-des esp-md5-hmac ,lifedur= 0s and 0kb,spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x4
After the proposal is accepted, IKE finishes the negotiations, generates the keying material, and then notifiesIPsec of the new security associations (one security association for each direction).
00:24:35: IPSEC(key_engine): got a queue event...The following output pertains to the inbound SA. The conn_id value references an entry in the crypto engineconnection table.
00:24:35: IPSEC(initialize_sas): ,(key eng. msg.) dest= 172.21.114.123, src= 172.21.114.67,dest_proxy= 172.21.114.123/255.255.255.255/0/0 (type=1),src_proxy= 172.21.114.67/255.255.255.255/0/0 (type=1),protocol= ESP, transform= esp-des esp-md5-hmac ,lifedur= 120s and 4608000 kb,spi= 0x120F043C(302974012), conn_id= 29, keysize= 0, flags= 0x4
The following output pertains to the outbound SA:
00:24:35: IPSEC(initialize_sas): ,(key eng. msg.) src= 172.21.114.123, dest= 172.21.114.67,src_proxy= 172.21.114.123/255.255.255.255/0/0 (type=1),dest_proxy= 172.21.114.67/255.255.255.255/0/0 (type=1),protocol= ESP, transform= esp-des esp-md5-hmac ,lifedur= 120s and 4608000kb,spi= 0x38914A4(59315364), conn_id= 30, keysize= 0, flags= 0x4
IPsec then installs the SA information into its SA database.
00:24:35: IPSEC(create_sa): sa created,(sa) sa_dest= 172.21.114.123, sa_prot= 50,sa_spi= 0x120F043C(302974012),sa_trans= esp-des esp-md5-hmac , sa_conn_id= 29
sa_lifetime(k/sec)= (4445923/500)00:24:35: IPSEC(create_sa): sa created,(sa) sa_dest= 172.21.114.67, sa_prot= 50,sa_spi= 0x38914A4(59315364),sa_trans= esp-des esp-md5-hmac , sa_conn_id= 30
sa_lifetime(k/sec)= (4445923/500)The following is sample output from the debugcryptoipsec command as seen on the peer router. In thisexample, IKE verifies whether IPsec will accept an SA proposal. Although the peer sent two proposals, IPsecaccepted the first proposal.
00:26:15: IPSEC(validate_proposal_request): proposal part #1,(key eng. msg.) dest= 172.21.114.67, src= 172.21.114.123,dest_proxy= 172.21.114.67/255.255.255.255/0/0 (type=1),src_proxy= 172.21.114.123/255.255.255.255/0/0 (type=1),protocol= ESP, transform= esp-des esp-md5-hmac ,lifedur= 0s and 0kb,spi= 0x0(0), conn_id= 0, keysize= 0, flags= 0x4
IKE prompts for SPIs.
00:26:15: IPSEC(key_engine): got a queue event...00:26:15: IPSEC(spi_response): getting spi 59315364ld for SA
from 172.21.114.123 to 172.21.114.67 for prot 3
Cisco IOS Debug Command Reference - Commands A through D 517
debug clns esis events through debug dbconn tcpdebug crypto ipsec
IKE does the remaining processing, completing the negotiation and generating keys. IKE then notifies IPsecabout the new SAs.
00:26:15: IPSEC(key_engine): got a queue event...The following output pertains to the inbound SA:
00:26:15: IPSEC(initialize_sas): ,(key eng. msg.) dest= 172.21.114.67, src= 172.21.114.123,dest_proxy= 172.21.114.67/0.0.0.0/0/0 (type=1),src_proxy= 172.21.114.123/0.0.0.0/0/0 (type=1),protocol= ESP, transform= esp-des esp-md5-hmac ,lifedur= 120s and 4608000kb,spi= 0x38914A4(59315364), conn_id= 25, keysize= 0, flags= 0x4
The following output pertains to the outbound SA:
00:26:15: IPSEC(initialize_sas): ,(key eng. msg.) src= 172.21.114.67, dest= 172.21.114.123,src_proxy= 172.21.114.67/0.0.0.0/0/0 (type=1),dest_proxy= 172.21.114.123/0.0.0.0/0/0 (type=1),protocol= ESP, transform= esp-des esp-md5-hmac ,lifedur= 120s and 4608000kb,spi= 0x120F043C(302974012), conn_id= 26, keysize= 0, flags= 0x4
IPsec then installs the SA information into its SA database:
00:26:15: IPSEC(create_sa): sa created,(sa) sa_dest= 172.21.114.67, sa_prot= 50,sa_spi= 0x38914A4(59315364),sa_trans= esp-des esp-md5-hmac , sa_conn_id= 25
sa_lifetime(k/sec)= (4445923/500)00:26:15: IPSEC(create_sa): sa created,(sa) sa_dest= 172.21.114.123, sa_prot= 50,sa_spi= 0x120F043C(302974012),sa_trans= esp-des esp-md5-hmac , sa_conn_id= 26
sa_lifetime(k/sec)= (4445923/500)
Cisco IOS Debug Command Reference - Commands A through D518
debug clns esis events through debug dbconn tcpdebug crypto ipsec
debug crypto ipsec client ezvpnTo display information about voice control messages that have been captured by the Voice DSP ControlMessage Logger and about Cisco Easy VPN remote connections, use thedebugcryptoipsecclientezvpncommand in privileged EXEC mode. To disable debugging output, use the noform of this command.
debug crypto ipsec client ezvpn
no debug crypto ipsec client ezvpn
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced on Cisco 806, Cisco 826, Cisco 827, and Cisco828 routers; Cisco 1700 series routers; and Cisco uBR905 and Cisco uBR925cable access routers.
12.2(4)YA
This command was integrated into Cisco IOS Release 12.2(13)T.12.2(13)T
This command was expanded to support the Easy VPN Remote feature.12.3(4)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
This command is supported in the Cisco IOS 12.2SX family of releases. Supportin a specific 12.2SX release is dependent on your feature set, platform, andplatform hardware.
12.2SX
Usage Guidelines To force the Voice DSP Contol Message Logger to reestablish the virtual private network (VPN) connections,use the clearcryptosaandclearcryptoisakmp commands to delete the IPSec security associations and InternetKey Exchange (IKE) connections, respectively.
Examples The following example shows debugging messages when the Voice DSP Contol Message Logger is turnedon and typical debugging messages that appear when the VPN tunnel is created:
Router# debug crypto ipsec client ezvpn
EzVPN debugging is onrouter#00:02:28: EZVPN(hw1): Current State: IPSEC_ACTIVE
Cisco IOS Debug Command Reference - Commands A through D 519
debug clns esis events through debug dbconn tcpdebug crypto ipsec client ezvpn
00:02:28: EZVPN(hw1): Event: RESET00:02:28: EZVPN(hw1): ezvpn_close00:02:28: EZVPN(hw1): New State: CONNECT_REQUIRED00:02:28: EZVPN(hw1): Current State: CONNECT_REQUIRED00:02:28: EZVPN(hw1): Event: CONNECT00:02:28: EZVPN(hw1): ezvpn_connect_request00:02:28: EZVPN(hw1): New State: READY00:02:29: EZVPN(hw1): Current State: READY00:02:29: EZVPN(hw1): Event: MODE_CONFIG_REPLY00:02:29: EZVPN(hw1): ezvpn_mode_config00:02:29: EZVPN(hw1): ezvpn_parse_mode_config_msg00:02:29: EZVPN: Attributes sent in message:00:02:29: Address: 10.0.0.500:02:29: Default Domain: cisco.com00:02:29: EZVPN(hw1): ezvpn_nat_config00:02:29: EZVPN(hw1): New State: SS_OPEN00:02:29: EZVPN(hw1): Current State: SS_OPEN00:02:29: EZVPN(hw1): Event: SOCKET_READY00:02:29: EZVPN(hw1): No state change00:02:30: EZVPN(hw1): Current State: SS_OPEN00:02:30: EZVPN(hw1): Event: MTU_CHANGED00:02:30: EZVPN(hw1): No state change00:02:30: EZVPN(hw1): Current State: SS_OPEN00:02:30: EZVPN(hw1): Event: SOCKET_UP00:02:30: ezvpn_socket_up00:02:30: EZVPN(hw1): New State: IPSEC_ACTIVEThe following example shows the typical display for a VPN tunnel that is reset with theclearcryptoipsecclientezvpn command:
3d17h: EZVPN: Current State: READY3d17h: EZVPN: Event: RESET3d17h: ezvpn_reconnect_request3d17h: ezvpn_close3d17h: ezvpn_connect_request3d17h: EZVPN: New State: READY3d17h: EZVPN: Current State: READY3d17h: EZVPN: Event: MODE_CONFIG_REPLY3d17h: ezvpn_mode_config3d17h: ezvpn_parse_mode_config_msg3d17h: EZVPN: Attributes sent in message:3d17h: DNS Primary: 172.16.0.2503d17h: DNS Secondary: 172.16.0.2513d17h: NBMS/WINS Primary: 172.16.0.2523d17h: NBMS/WINS Secondary: 172.16.0.2533d17h: Split Tunnel List: 13d17h: Address : 172.16.0.1283d17h: Mask : 255.255.255.1283d17h: Protocol : 0x03d17h: Source Port: 03d17h: Dest Port : 03d17h: Split Tunnel List: 23d17h: Address : 172.16.1.1283d17h: Mask : 255.255.255.1283d17h: Protocol : 0x03d17h: Source Port: 03d17h: Dest Port : 03d17h: Default Domain: cisco.com3d17h: ezvpn_nat_config3d17h: EZVPN: New State: SS_OPEN3d17h: EZVPN: Current State: SS_OPEN3d17h: EZVPN: Event: SOCKET_READY3d17h: EZVPN: No state change3d17h: EZVPN: Current State: SS_OPEN3d17h: EZVPN: Event: SOCKET_READY3d17h: EZVPN: No state change3d17h: EZVPN: Current State: SS_OPEN3d17h: EZVPN: Event: MTU_CHANGED3d17h: EZVPN: No state change3d17h: EZVPN: Current State: SS_OPEN3d17h: EZVPN: Event: SOCKET_UP3d17h: EZVPN: New State: IPSEC_ACTIVE
Cisco IOS Debug Command Reference - Commands A through D520
debug clns esis events through debug dbconn tcpdebug crypto ipsec client ezvpn
3d17h: EZVPN: Current State: IPSEC_ACTIVE3d17h: EZVPN: Event: MTU_CHANGED3d17h: EZVPN: No state change3d17h: EZVPN: Current State: IPSEC_ACTIVE3d17h: EZVPN: Event: SOCKET_UPThe following example shows the typical display for a VPN tunnel that is removed from the interface withthe nocryptoipsecclientezvpn command:
4d16h: EZVPN: Current State: IPSEC ACTIVE4d16h: EZVPN: Event: REMOVE INTERFACE CFG4d16h: ezvpn_close_and_remove4d16h: ezvpn_close4d16h: ezvpn_remove4d16h: EZVPN: New State: IDLE
Related Commands DescriptionCommand
Displays debugging messages for generic IPSecevents.
debug crypto ipsec
Displays debugging messages for IKE events.debug crypto isakmp
Cisco IOS Debug Command Reference - Commands A through D 521
debug clns esis events through debug dbconn tcpdebug crypto ipsec client ezvpn
debug crypto ipsec haTo enable debuggingmessages for IP Security (IPSec) high availability, use the debugcryptoipsechacommandin privileged EXEC mode. To disable debugging output, use the no form of this command.
debug crypto ipsec ha [detail] [update]
no debug crypto ipsec ha [detail] [update]
Syntax Description (Optional) Displays detailed debug information.detail
(Optional) Displays updates for inbound and outboundrelated data.
update
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.3(11)T
Examples The following example is sample output of the debugcryptoipsecha command for both the active and stanbyrouter:
Active RouterRouter# debug crypto ipsec ha
Crypto IPSEC High Availability debugging is on*Sep 29 17:03:01.851:IPSec HA (crypto_ha_ipsec_notify_add_sa):called*Sep 29 17:03:01.851:IPSec HA (crypto_ha_ipsec_notify_add_sa):New IPsec SA added... notifyingHA MgrStandby RouterRouter# debug crypto ipsec ha
Crypto IPSEC High Availability debugging is onvrf-lite-R1#*Sep 29 17:03:01.031:IPSec HA (crypto_ha_ipsec_mgr_recv_add_sas):HA mgr wants to insert thefollowing bundle*Sep 29 17:03:01.031:IPSec HA (crypto_ha_ipsec_mgr_recv_add_sas):This SA Supports DPD*Sep 29 17:03:01.031:IPSec HA (crypto_ha_ipsec_gen_sa):Sending Kei to IPSec num_kei 2*Sep 29 17:03:01.039:IPSec HA (crypto_ha_ipsec_notify_add_sa):called*Sep 29 17:03:01.039:IPSec HA (crypto_ha_ipsec_notify_add_sa):operation not performed asstandby ip 4.0.0.3
The following example is sample debug output with the detail keyword:
Active Router*Sep 29 17:05:48.803:IPSec HA (crypto_ha_ipsec_mgr_set_state_common):called for vip 4.0.0.3*Sep 29 17:06:11.655:IPSec HA (crypto_ha_ipsec_mgr_bulk_sync_sas):Bulk sync request fromstandby for local addr 4.0.0.3*Sep 29 17:06:44.059:IPSec HA (crypto_ha_ipsec_notify_add_sa):called
Cisco IOS Debug Command Reference - Commands A through D522
debug clns esis events through debug dbconn tcpdebug crypto ipsec ha
*Sep 29 17:06:44.059:IPSec HA (crypto_ha_ipsec_notify_add_sa):New IPsec SA added... notifyingHA MgrStandby RouterRouter# debug crypto ipsec ha detail
Crypto IPSEC High Availability Detail debugging is onvrf-lite-R1#*Sep 29 17:06:44.063:IPSec HA (crypto_ha_ipsec_mgr_recv_add_sas):HA mgr wants to insert thefollowing bundle*Sep 29 17:06:44.063:IPSec HA (crypto_ha_ipsec_mgr_recv_add_sas):This SA Supports DPD*Sep 29 17:06:44.063:IPSec HA (crypto_ha_ipsec_gen_sa):Sending Kei to IPSec num_kei 2*Sep 29 17:06:44.071:IPSec HA (crypto_ha_ipsec_notify_add_sa):called*Sep 29 17:06:44.071:IPSec HA (crypto_ha_ipsec_notify_add_sa):operation not performed asstandby ip 4.0.0.3
The following example is sample debug output with the update keyword:
Active Router*Sep 29 17:27:30.839:IPSec HA(check_and_send_replay_update):Replay triggered update seq_num1000 last-sent 0 dir inbound*Sep 29 17:27:30.839:IPSec HA(create_update_struct):Sending inbound update*Sep 29 17:27:30.839:IPSec HA(send_update_struct):
Outbound - New KB 0, New replay 0Inbound - New KB 3998772, New replay 1000
*Sep 29 17:29:30.883:IPSec HA(check_and_send_replay_update):Replay triggered update seq_num2000 last-sent 1000 dir inbound*Sep 29 17:29:30.883:IPSec HA(create_update_struct):Sending inbound update*Sep 29 17:29:30.883:IPSec HA(send_update_struct):
Outbound - New KB 0, New replay 0Inbound - New KB 3998624, New replay 2000
*Sep 29 17:30:30.899:IPSec HA(check_and_send_replay_update):Replay triggered update seq_num3000 last-sent 2000 dir inbound*Sep 29 17:30:30.899:IPSec HA(create_update_struct):Sending inbound update*Sep 29 17:30:30.899:IPSec HA(send_update_struct):
Outbound - New KB 0, New replay 0Inbound - New KB 3998476, New replay 3000
*Sep 29 17:32:30.943:IPSec HA(check_and_send_replay_update):Replay triggered update seq_num4000 last-sent 3000 dir inbound*Sep 29 17:32:30.943:IPSec HA(create_update_struct):Sending inbound update*Sep 29 17:32:30.943:IPSec HA(send_update_struct):
Outbound - New KB 0, New replay 0Inbound - New KB 3998327, New replay 4000
Standby Router*Sep 29 17:27:28.887:IPSec HA(crypto_ha_ipsec_mgr_recv_update_sa):called*Sep 29 17:27:28.887:IPSec HA(crypto_ha_ipsec_mgr_recv_update_sa):UPDATING INBOUND SA:ip =4.0.0.3, protocol = 50, spi = B8A47EC9,
NEW KB LIFE = 3998772,NEW REPLAY WINDOW START = 1000,
*Sep 29 17:29:28.915:IPSec HA(crypto_ha_ipsec_mgr_recv_update_sa):called*Sep 29 17:29:28.915:IPSec HA(crypto_ha_ipsec_mgr_recv_update_sa):UPDATING INBOUND SA:ip =4.0.0.3, protocol = 50, spi = B8A47EC9,
NEW KB LIFE = 3998624,NEW REPLAY WINDOW START = 2000,
*Sep 29 17:30:28.939:IPSec HA(crypto_ha_ipsec_mgr_recv_update_sa):called*Sep 29 17:30:28.939:IPSec HA(crypto_ha_ipsec_mgr_recv_update_sa):UPDATING INBOUND SA:ip =4.0.0.3, protocol = 50, spi = B8A47EC9,
NEW KB LIFE = 3998476,NEW REPLAY WINDOW START = 3000,
*Sep 29 17:32:28.955:IPSec HA(crypto_ha_ipsec_mgr_recv_update_sa):called*Sep 29 17:32:28.955:IPSec HA(crypto_ha_ipsec_mgr_recv_update_sa):UPDATING INBOUND SA:ip =4.0.0.3, protocol = 50, spi = B8A47EC9,
NEW KB LIFE = 3998327,NEW REPLAY WINDOW START = 4000,
Related Commands DescriptionCommand
Displays crypto high availability debugginginformation.
debug crypto ha
Cisco IOS Debug Command Reference - Commands A through D 523
debug clns esis events through debug dbconn tcpdebug crypto ipsec ha
DescriptionCommand
Enables debugging messages for ISAKMP highavailability.
debug crypto isakmp ha
Cisco IOS Debug Command Reference - Commands A through D524
debug clns esis events through debug dbconn tcpdebug crypto ipsec ha
debug crypto isakmpTo display messages about Internet Key Exchange (IKE) events, use the debug crypto isakmp command inprivileged EXEC mode. To disable debugging output, use the no form of this command.
debug crypto isakmp [aaa| errors| kmi number]
no debug crypto isakmp [aaa| errors| kmi]
Syntax Description (Optional) Specifies accounting events.aaa
(Optional) Enables error events.errors
(Optional) Captures keymanagement interface (KMI)messages.
kmi number
Command Modes Privileged EXEC (#)
Command History ModificationsRelease
This command was introduced.11.3 T
The aaa keyword was added.12.2(15)T
This command was integrated into Cisco IOS Release 12.2(18)SXD.12.2(18)SXD
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
This command was integrated into Cisco IOS XE Release 2.6.Cisco IOS XE Release 2.6
This commandwasmodified. The kmi number keyword-argument pairwas added.
15.3(2)T
Usage Guidelines IKE is a key management protocol standard that is used in conjunction with the IPsec to configure basic IPsecVPNs. IPsec can be configured without IKE, but IKE enhances IPsec by providing additional features,flexibility, and ease of configuration for the IPsec standard. IKE is a hybrid protocol that implements theOakley key exchange and Skeme key exchange inside the Internet Security Association and KeyManagementProtocol (ISAKMP) framework.
The debug crypto isakmp kmi command must be enabled prior to any traffic that triggers sessions. Thiscommand enables capturing KMI sequence events along with timestamps for a particular IKE securityassociation (SA) and corresponding IPsec SA. The number argument denotes the number of KMI messagesto be captured. The KMI sequence is displayed in the output of the show crypto isakmp peers detail command.
Cisco IOS Debug Command Reference - Commands A through D 525
debug clns esis events through debug dbconn tcpdebug crypto isakmp
Examples The following is sample output from the debug crypto isakmp command for an IKE peer that initiates anIKE negotiation:
IKE negotiates its own SA.
Device# debug crypto isakmp
20:26:58: ISAKMP (8): beginning Main Mode exchange20:26:58: ISAKMP (8): processing SA payload. message ID = 020:26:58: ISAKMP (8): Checking ISAKMP transform 1 against priority 10 policy20:26:58: ISAKMP: encryption DES-CBC20:26:58: ISAKMP: hash SHA20:26:58: ISAKMP: default group 120:26:58: ISAKMP: auth pre-share20:26:58: ISAKMP (8): atts are acceptable. Next payload is 0
When IKE finds a matching policy, each peer in the network uses the IKE SA to authenticate another peer.
20:26:58: ISAKMP (8): SA is doing pre-shared key authentication20:26:59: ISAKMP (8): processing KE payload. message ID = 020:26:59: ISAKMP (8): processing NONCE payload. message ID = 020:26:59: ISAKMP (8): SKEYID state generated20:26:59: ISAKMP (8): processing ID payload. message ID = 020:26:59: ISAKMP (8): processing HASH payload. message ID = 020:26:59: ISAKMP (8): SA has been authenticated
Next, IKE negotiates to set up the IPsec SA by searching for a matching transform set.
20:26:59: ISAKMP (8): beginning Quick Mode exchange, M-ID of 76716284520:26:59: ISAKMP (8): processing SA payload. message ID = 76716284520:26:59: ISAKMP (8): Checking IPSec proposal 120:26:59: ISAKMP: transform 1, ESP_DES20:26:59: ISAKMP: attributes in transform:20:26:59: ISAKMP: encaps is 120:26:59: ISAKMP: SA life type in seconds20:26:59: ISAKMP: SA life duration (basic) of 60020:26:59: ISAKMP: SA life type in kilobytes20:26:59: ISAKMP: SA life duration (VPI) of0x0 0x46 0x50 0x0
20:26:59: ISAKMP: authenticator is HMAC-MD520:26:59: ISAKMP (8): atts are acceptable.
After finding a matching IPsec transform set for the two peers, an IPsec SA is created (one SA is created foreach direction).
20:26:59: ISAKMP (8): processing NONCE payload. message ID = 76716284520:26:59: ISAKMP (8): processing ID payload. message ID = 76716284520:26:59: ISAKMP (8): processing ID payload. message ID = 76716284520:26:59: ISAKMP (8): Creating IPSec SAs20:26:59: inbound SA from 155.0.0.2 to 155.0.0.1 (proxy 155.0.0.2 to 155.0.0.1 )20:26:59: has spi 454886490 and conn_id 9 and flags 420:26:59: lifetime of 600 seconds20:26:59: lifetime of 4608000 kilobytes20:26:59: outbound SA from 155.0.0.1 to 155.0.0.2 (proxy 155.0.0.1
to 155.0.0.2 )20:26:59: has spi 75506225 and conn_id 10 and flags 420:26:59: lifetime of 600 seconds20:26:59: lifetime of 4608000 kilobytes
The following is sample output from the debug crypto isakmp command using the aaa keyword:
Device# debug crypto isakmp aaa
01:38:55: ISAKMP AAA: Sent Accounting Message
Cisco IOS Debug Command Reference - Commands A through D526
debug clns esis events through debug dbconn tcpdebug crypto isakmp
01:38:55: ISAKMP AAA: Accounting message successful01:38:55: ISAKMP AAA: Rx Accounting Message01:38:55: ISAKMP AAA: Adding Client Attributes to Accounting Record01:38:55: ISAKMP AAA: Accounting Started
01:09:55: ISAKMP AAA: Accounting received kei with flags 0x104201:09:55: ISAKMP AAA: Updating Stats01:09:55: Previous in acc (PKTS) IN: 10 OUT: 1001:09:55: Traffic on sa (PKTS) IN: 176 OUT: 176
The following example shows how to set the KMI sequence for a value of 10. The KMI sequence is displayedin the output of the show crypto isakmp peers detail command.
Device# debug crypto isakmp kmi 10Crypto ISAKMP KMI debugging is on
Device# show crypto isakmp peers detail
Peer: 1.1.1.2 Port: 500 Local: 1.1.1.1Phase1 id: 1.1.1.2flags:NAS Port: 0 (Normal)IKE SAs: 1 IPSec SA bundles: 2Peer Handle: 0x80000005last_locker: 0xD198B32, last_last_locker: 0x0last_unlocker: 0x0, last_last_unlocker: 0x0
KMI messages(Time of capture - KMI message)
*Mar 7 12:20:28.124 KEY_ENG_REQUEST_SAS*Mar 7 12:20:28.165 KEY_MGR_CREATE_IPSEC_SAS*Mar 7 12:20:28.165 KEY_ENG_NOTIFY_QOS_GROUP*Mar 7 12:20:28.165 KEY_ENG_NOTIFY_INCR_COUNT*Mar 7 12:20:58.124 KEY_ENG_REQUEST_SAS*Mar 7 12:20:58.126 KEY_MGR_CREATE_IPSEC_SAS*Mar 7 12:20:58.126 KEY_ENG_NOTIFY_QOS_GROUP
Related Commands DescriptionCommand
Defines an ISAKMP profile and audits IPsec usersessions.
crypto isakmp profile
Enters crypto map configuration mode and creates ormodifies a crypto map entry, creates a crypto profilethat provides a template for configuration of adynamically created cryptomap, or configures a clientaccounting list.
crypto map (global IPsec)
Displays ISAKMP peer descriptions.show crypto isakmp peers
Cisco IOS Debug Command Reference - Commands A through D 527
debug clns esis events through debug dbconn tcpdebug crypto isakmp
debug crypto isakmp haTo enable debugging messages for Internet Security Association and Key Management Protocol (ISAKMP)high availability, use the debugcryptoisakmphacommand in privileged EXEC mode. To disable debuggingmessages, use the no form of this command.
debug crypto isakmp ha [detail]
no debug crypto isakmp ha [detail]
Syntax Description (Optional) Displays detailed debug information.detail
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.3(11)T
Examples The following is sample output for a standby router from the debugcryptoisakmphacommand:
Active Routerno debug messageStandby RouterRouter# debug crypto isakmp ha
Crypto ISAKMP High Availability debugging is onvrf-lite-R1#*Sep 28 21:54:41.815:IKE HA:(4.0.0.3) Adding STANDBY IKE SA*Sep 28 21:54:41.843:IKE HA:Create peer struct for local 4.0.0.3 remote 4.0.0.5 & locked*Sep 28 21:54:41.843:IKE HA:IKE SA inserted on standby with src = 4.0.0.5, dst = 4.0.0.3The following sample output is displayed when the detail keyword is issued. (Note that debug output withoutissuing the detail keyword is the same as the debug output with the detail keyword.)
Active RouterRouter# debug crypto isakmp ha detail
Crypto ISAKMP High Availability detailed debugging is onvrf-lite-R1#*Sep 29 16:59:15.035:IKE HA:IKE SA is already failed overStandby RouterRouter# debug crypto isakmp ha detailCrypto ISAKMP High Availability detailed debugging is onvrf-lite-R2#*Sep 29 16:59:14.371:IKE HA:(4.0.0.3) Adding STANDBY IKE SA*Sep 29 16:59:14.411:IKE HA:Create peer struct for local 4.0.0.3 remote 4.0.0.5 & locked*Sep 29 16:59:14.411:IKE HA:IKE SA inserted on standby with src = 4.0.0.5, dst = 4.0.0.3
Cisco IOS Debug Command Reference - Commands A through D528
debug clns esis events through debug dbconn tcpdebug crypto isakmp ha
Related Commands DescriptionCommand
Displays crypto high availability debugginginformation.
debug crypto ha
Enables debugging messages for IPSec highavailability.
debug crypto ipsec ha
Cisco IOS Debug Command Reference - Commands A through D 529
debug clns esis events through debug dbconn tcpdebug crypto isakmp ha
debug crypto key-exchangeTo show Digital Signature Standard (DSS) public key exchange messages, use thedebugcryptokey-exchangecommand in privileged EXEC mode. To disable debugging output, use the noform of this command.
debug crypto key-exchange
no debug crypto key-exchange
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines Encryption and authentication are provided by a software service on the router called a cryptoengine. Thecrypto engine performs authentication through DSS public and private keys when a connection is set up. DSSis a means of sending a "signature" at the end of a message that positively identifies the author of the message.The signature cannot be forged or duplicated by others, so whoever received a message with a DSS signatureknows exactly who sent the message.
If the process of exchanging DSS public keys with a peer router by means of the configcryptokey-exchangecommand is not successful, try to exchange DSS public keys again after enabling thedebugcryptokey-exchange command to help you diagnose the problem.
Examples The following is sample output from the debugcryptokey-exchange command. The first shows output fromthe initiating router in a key exchange. The second shows output from the passive router in a key exchange.The number of bytes received should match the number of bytes sent from the initiating side, although thenumber of messages can be different.
Router# debug crypto key-exchangeCRYPTO-KE: Sent 4 bytes.CRYPTO-KE: Sent 2 bytes.CRYPTO-KE: Sent 2 bytes.CRYPTO-KE: Sent 2 bytes.CRYPTO-KE: Sent 64 bytes.Router# debug crypto key-exchangeCRYPTO-KE: Received 4 bytes.CRYPTO-KE: Received 2 bytes.CRYPTO-KE: Received 2 bytes.CRYPTO-KE: Received 2 bytes.CRYPTO-KE: Received 49 bytes.CRYPTO-KE: Received 15 bytes.
Related Commands DescriptionCommand
Displays connection setup messages and their flowthrough the router.
debug crypto sesmgmt
Cisco IOS Debug Command Reference - Commands A through D530
debug clns esis events through debug dbconn tcpdebug crypto key-exchange
debug crypto mibTo display debug messages for the IP Security (IPsec) MIB subsystem, use the debugcryptomib commandin privileged EXEC mode. To disable debugging output, use the no form of this command.
debug crypto mib [detail| error]
no debug crypto mib [detail| error]
Syntax Description (Optional) Displays different events as they occur inthe IPsec MIB subsystem.
Because the output for this keyword can bequite long, due consideration should be givento enabling debugcryptomibdetail.
Note
detail
(Optional) Displays error events in the MIB agent.error
Command Default Message notification debugging is not enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.1(4)E
This command was integrated into Cisco IOS Release 12.2(4)T.12.2(4)T
The detail and error keywords were added.12.4(4)T
Examples The following example shows IPsec MIB debug message notification being enabled:
Router# debug crypto mibCrypto IPSec Mgmt Entity debugging is onThe following example shows that detailed information about events that are occurring in the subsystem hasbeen requested:
Router# debug crypto mib detailThe following example shows that information has been requested about error events in the MIB agent:
Router# debugcryptomiberror
Cisco IOS Debug Command Reference - Commands A through D 531
debug clns esis events through debug dbconn tcpdebug crypto mib
Related Commands DescriptionCommand
Displays the size of the IPSec failure history table.show cryptomib ipsec flowmib history failure size
Displays the size of the IPSec tunnel history table.show crypto mib ipsec flowmib history tunnel size
Displays the IPSec Flow MIB version used by therouter.
show crypto mib ipsec flowmib version
Cisco IOS Debug Command Reference - Commands A through D532
debug clns esis events through debug dbconn tcpdebug crypto mib
debug crypto pki messagesTo display debugging messages for the details of the interaction (message dump) between the certificationauthority (CA) and the router, use the debugcryptopkimessages command in privileged EXEC mode. Todisable debugging output, use the no form of this command.
debug crypto pki messages
no debug crypto pki messages
Syntax Description This command has no arguments or keywords.
Command Default Disabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.0
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines The debug crypto pki messages command displays messages about the actual data being sent and receivedduring public key infrastructure (PKI) transactions. This command is internal for use by Cisco supportpersonnel.
You can use the show crypto ca certificates command to display information about your certificate.
Examples The following is sample output from the debugcryptopkimessagescommand:
Router# debug crypto pki messagesFingerprint: 2CFC6265 77BA6496 3AEFCB50 29BC2BF200:48:23:Write out pkcs#10 content:27400:48:23:30 82 01 0E 30 81 B9 02 01 00 30 22 31 20 30 1E 06 09 2A 8600:48:23:48 86 F7 0D 01 09 02 16 11 70 6B 69 2D 33 36 61 2E 63 69 7300:48:23:63 6F 2E 63 6F 6D 30 5C 30 0D 06 09 2A 86 48 86 F7 0D 01 0100:48:23:01 05 00 03 4B 00 30 48 02 41 00 DD 2C C6 35 A5 3F 0F 97 6C00:48:23:11 E2 81 95 01 6A 80 34 25 10 C4 5F 3D 8B 33 1C 19 50 FD 9100:48:23:6C 2D 65 4C B6 A6 B0 02 1C B2 84 C1 C8 AC A4 28 6E EF 9D 3B00:48:23:30 98 CB 36 A2 47 4E 7E 6F C9 3E B8 26 BE 15 02 03 01 00 0100:48:23:A0 32 30 10 06 09 2A 86 48 86 F7 0D 01 09 07 31 03 13 01 6300:48:23:30 1E 06 09 2A 86 48 86 F7 0D 01 09 0E 31 11 14 0F 30 0D 3000:48:23:0B 06 03 55 1D 0F 04 04 03 02 05 A0 30 0D 06 09 2A 86 48 8600:48:23:F7 0D 01 01 04 05 00 03 41 00 2C FD 88 2C 8A 13 B6 81 88 EA00:48:23:5C FD AE 52 8F 2C 13 95 9E 9D 8B A4 C9 48 32 84 BF 05 03 4900:48:23:63 27 A3 AC 6D 74 EB 69 E3 06 E9 E4 9F 0A A8 FB 20 F0 02 0300:48:23:BE 90 57 02 F2 75 8E 0F 16 60 10 6F BE 2B00:48:23:Enveloped Data ...
Cisco IOS Debug Command Reference - Commands A through D 533
debug clns esis events through debug dbconn tcpdebug crypto pki messages
00:48:23:30 80 06 09 2A 86 48 86 F7 0D 01 07 03 A0 80 30 80 02 01 0000:48:23:31 80 30 82 01 0F 02 01 00 30 78 30 6A 31 0B 30 09 06 03 5500:48:23:04 06 13 02 55 53 31 0B 30 09 06 03 55 04 08 13 02 43 41 3100:48:23:13 30 11 06 03 55 04 07 13 0A 53 61 6E 74 61 20 43 72 75 7A00:48:23:31 15 30 13 06 03 55 04 0A 13 0C 43 69 73 63 6F 20 53 79 7300:48:23:74 65 6D 31 0E 30 0C 06 03 55 04 0B 13 05 49 50 49 53 55 3100:48:23:Signed Data 1382 bytes00:48:23:30 80 06 09 2A 86 48 86 F7 0D 01 07 02 A0 80 30 80 02 01 0100:48:23:31 0E 30 0C 06 08 2A 86 48 86 F7 0D 02 05 05 00 30 80 06 0900:48:23:2A 86 48 86 F7 0D 01 07 01 A0 80 24 80 04 82 02 75 30 80 0600:48:23:02 55 53 31 0B 30 09 06 03 55 04 08 13 02 43 41 31 13 30 1100:48:23:33 34 5A 17 0D 31 30 31 31 31 35 31 38 35 34 33 34 5A 30 2200:48:23:31 20 30 1E 06 09 2A 86 48 86 F7 0D 01 09 02 16 11 70 6B 6900:48:23:2D 33 36 61 2E 63 69 73 63 6F 2E 63 6F 6D 30 5C 30 0D 06 0900:48:23:2A 86 48 86 F7 0D 01 01 01 05 00 03 4B 00 30 48 02 41 00 DD00:48:23:2C C6 35 A5 3F 0F 97 6C 11 E2 81 95 01 6A 80 34 25 10 C4 5F00:48:23:3D 8B 33 1C 19 50 FD 91 6C 2D 65 4C B6 A6 B0 02 1C B2 84 C100:48:23:86 F7 0D 01 01 01 05 00 04 40 C6 24 36 D6 D5 A6 92 80 5D E500:48:23:15 F7 3E 15 6D 71 E1 D0 13 2B 14 64 1B 0C 0F 96 BF F9 2E 0500:48:23:EF C2 D6 CB 91 39 19 F8 44 68 0E C5 B5 84 18 8B 2D A4 B1 CD00:48:23:3F EC C6 04 A5 D9 7C B1 56 47 3F 5B D4 93 00 00 00 00 00 0000:48:23:00 0000:48:24:Received pki message:1778 types...
Related Commands DescriptionCommand
Obtains the certificate of your router from the CA.crypto ca enroll
Displays debugging messages for the trace ofinteraction (message type) between the CA and therouter.
debug crypto pki transactions
Displays information about your certificate, thecertificate of the CA, and any RA certificates.
show crypto ca certificates
Cisco IOS Debug Command Reference - Commands A through D534
debug clns esis events through debug dbconn tcpdebug crypto pki messages
debug crypto pki serverTo enable debugging for a crypto public key infrastructure (PKI) certificate server, use thedebugcryptopkiservercommand in privileged EXEC mode. To disable debugging, use the no form of thiscommand.
debug crypto pki server
no debug crypto pki server
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.3(4)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Examples The following example shows how to enable debugging for a certificate server. This example also containssample debug messages, which allow users to troubleshoot the various certificate-request-related stages andtasks that are handled by the certificate server.
Router# debug crypto pki serverCrypto PKI Certificate Server debugging is onOct 15 19:50:41.003:CRYPTO_CS:old RA cert flag 0x4Oct 15 19:50:41.003:CRYPTO_CS:new RA cert flag 0x1000COct 15 19:50:41.003:CRYPTO_CS:nvram filesystemOct 15 19:50:41.279:CRYPTO_CS:serial number 0x1 written.Oct 15 19:50:53.383:CRYPTO_CS:created a new serial file.Oct 15 19:50:53.383:CRYPTO_CS:SCEP server startedOct 15 19:50:53.419:%SYS-5-CONFIG_I:Configured from console by consoleOct 15 19:50:53.731:CRYPTO_CS:received a SCEP GetCACert requestOct 15 19:50:53.739:CRYPTO_CS:CA certificate sentOct 15 19:50:54.355:CRYPTO_CS:received a SCEP GetCACert requestOct 15 19:50:54.363:CRYPTO_CS:CA certificate sentOct 15 19:50:57.791:CRYPTO_CS:received a SCEP requestOct 15 19:50:57.795:CRYPTO_CS:read SCEP:registered and bound serviceSCEP_READ_DB_8Oct 15 19:50:57.947:CRYPTO_CS:scep msg type - 19Oct 15 19:50:57.947:CRYPTO_CS:trans id -3673CE2FF0235A4AE6F26242B00A4BB4Oct 15 19:50:58.679:CRYPTO_CS:read SCEP:unregistered and unboundservice SCEP_READ_DB_8Oct 15 19:50:58.683:CRYPTO_CS:received an enrollment requestOct 15 19:50:58.691:CRYPTO_CS:request has been authorized, transactionid=3673CE2FF0235A4AE6F26242B00A4BB4Oct 15 19:50:58.699:CRYPTO_CS:byte 2 in key usage in PKCS#10 is 0x7Oct 15 19:50:58.699:CRYPTO_CS:signatureOct 15 19:50:58.699:CRYPTO_CS:key_usage is 1Oct 15 19:50:58.703:CRYPTO_CS:enrollment request with pendingID 1 sentto the CAOct 15 19:50:58.707:CRYPTO_CS:write SCEP:registered and bound service
Cisco IOS Debug Command Reference - Commands A through D 535
debug clns esis events through debug dbconn tcpdebug crypto pki server
SCEP_WRTE_DB_8Oct 15 19:50:59.531:CRYPTO_CS:write SCEP:unregistered and unboundservice SCEP_WRTE_DB_8.....Oct 15 19:53:08.403:CRYPTO_CS:CS_RA_REQUEST:save cert in dbase,pending id = 2Oct 15 19:53:08.403:CRYPTO_CS:enrollment request 2 grantedOct 15 19:53:08.403:CRYPTO_PKI:All enrollment requests completed fortrustpoint ra.Oct 15 19:53:08.403:%CRYPTO-6-CERTRET:Certificate received fromCertificate AuthorityOct 15 19:53:08.403:CRYPTO_PKI:All enrollment requests completed fortrustpoint ra.Oct 15 19:53:08.403:CRYPTO_PKI:All enrollment requests completed fortrustpoint ra.Oct 15 19:53:08.407:CRYPTO_PKI:All enrollment requests completed fortrustpoint ra.Oct 15 19:53:19.623:IPSEC(key_engine):major = 1Oct 15 19:53:19.623:IPSEC(key_engine):expired_timer:skip ...Oct 15 19:53:35.707:CRYPTO_CS:received a SCEP requestOct 15 19:53:35.711:CRYPTO_CS:read SCEP:registered and bound serviceSCEP_READ_DB_14Oct 15 19:53:35.859:CRYPTO_CS:scep msg type - 20Oct 15 19:53:35.859:CRYPTO_CS:trans id -4D774FFE2F7CA9991A7F6A785E803E77Oct 15 19:53:36.591:CRYPTO_CS:read SCEP:unregistered and unboundservice SCEP_READ_DB_14Oct 15 19:53:36.595:CRYPTO_CS:received an enrollment requestOct 15 19:53:36.595:CRYPTO_CS:write SCEP:registered and bound serviceSCEP_WRTE_DB_14Oct 15 19:53:37.623:CRYPTO_CS:write SCEP:unregistered and unboundservice SCEP_WRTE_DB_14Oct 15 19:53:37.631:CRYPTO_CS:Certificate sent to requestor
Related Commands DescriptionCommand
Enables a Cisco IOS certificate server and enterscertificate server configuration mode.
crypto pki server
Cisco IOS Debug Command Reference - Commands A through D536
debug clns esis events through debug dbconn tcpdebug crypto pki server
debug crypto pki transactionsTo display debugging messages for the trace of interaction (message type) between the certification authority(CA) and the router, use the debugcryptopkitransactions command in privileged EXEC mode. To disabledebugging output, use the no form of this command.
debug crypto pki transactions
no debug crypto pki transactions
Syntax Description This command has no arguments or keywords.
Command Default Disabled
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.0
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines Use the debug crypto pki transactions command to display debugging messages pertaining to public keyinfrastructure (PKI) certificates. The messages will show status information during certificate enrollment andverification.
You can also use the show crypto ca certificates command to display information about your certificate.
Examples The following example, which authenticates and enrolls a CA, contains sample output for thedebugcryptopkitransactionscommand:
Router(config)# crypto ca authenticate mscaCertificate has the following attributes:Fingerprint:A5DE3C51 AD8B0207 B60BED6D 9356FB00% Do you accept this certificate? [yes/no]:yRouter# debug crypto pki transactions00:44:00:CRYPTO_PKI:Sending CA Certificate Request:GET /certsrv/mscep/mscep.dll/pkiclient.exe?operation=GetCACert&message=msca HTTP/1.000:44:00:CRYPTO_PKI:http connection opened00:44:01:CRYPTO_PKI:HTTP response header:HTTP/1.1 200 OKServer:Microsoft-IIS/5.0Date:Fri, 17 Nov 2000 18:50:59 GMTContent-Length:2693Content-Type:application/x-x509-ca-ra-cert
Content-Type indicates we have received CA and RA certificates.
00:44:01:CRYPTO_PKI:WARNING:A certificate chain could not be constructed while selecting
Cisco IOS Debug Command Reference - Commands A through D 537
debug clns esis events through debug dbconn tcpdebug crypto pki transactions
certificate status
00:44:01:CRYPTO_PKI:WARNING:A certificate chain could not be constructed while selectingcertificate status
00:44:01:CRYPTO_PKI:Name:CN = msca-rootRA, O = Cisco System, C = US00:44:01:CRYPTO_PKI:Name:CN = msca-rootRA, O = Cisco System, C = US00:44:01:CRYPTO_PKI:transaction GetCACert completed00:44:01:CRYPTO_PKI:CA certificate received.00:44:01:CRYPTO_PKI:CA certificate received.Router(config)# crypto ca enroll msca%% Start certificate enrollment ..% Create a challenge password. You will need to verbally provide this
password to the CA Administrator in order to revoke your certificate.For security reasons your password will not be saved in the configuration.Please make a note of it.
Password:Re-enter password:% The subject name in the certificate will be:Router.cisco.com% Include the router serial number in the subject name? [yes/no]:n% Include an IP address in the subject name? [yes/no]:nRequest certificate from CA? [yes/no]:y% Certificate request sent to Certificate Authority% The certificate request fingerprint will be displayed.% The 'show crypto ca certificate' command will also show the fingerprint.Router(config)#00:44:29:CRYPTO_PKI:transaction PKCSReq completed00:44:29:CRYPTO_PKI:status:00:44:29:CRYPTO_PKI:http connection opened00:44:29:CRYPTO_PKI: received msg of 1924 bytes00:44:29:CRYPTO_PKI:HTTP response header:HTTP/1.1 200 OKServer:Microsoft-IIS/5.0Date:Fri, 17 Nov 2000 18:51:28 GMTContent-Length:1778Content-Type:application/x-pki-message00:44:29:CRYPTO_PKI:signed attr:pki-message-type:00:44:29:13 01 3300:44:29:CRYPTO_PKI:signed attr:pki-status:00:44:29:13 01 3000:44:29:CRYPTO_PKI:signed attr:pki-recipient-nonce:00:44:29:04 10 B4 C8 2A 12 9C 8A 2A 4A E1 E5 15 DE 22 C2 B4 FD00:44:29:CRYPTO_PKI:signed attr:pki-transaction-id:00:44:29:13 20 34 45 45 41 44 42 36 33 38 43 33 42 42 45 44 45 39 4600:44:29:34 38 44 33 45 36 39 33 45 33 43 37 45 3900:44:29:CRYPTO_PKI:status = 100:certificate is granted00:44:29:CRYPTO__PKI:All enrollment requests completed.00:44:29:%CRYPTO-6-CERTRET:Certificate received from Certificate Authority
Related Commands DescriptionCommand
Authenticates the CA (by getting the certificate of theCA).
crypto ca authenticate
Obtains the certificate of your router from the CA.crypto ca enroll
Displays debugging messages for details of theinteraction (message dump) between the CA and therouter.
debug crypto pki messages
Displays information about your certificate, thecertificate of the CA, and any RA certificates.
show crypto ca certificates
Cisco IOS Debug Command Reference - Commands A through D538
debug clns esis events through debug dbconn tcpdebug crypto pki transactions
debug crypto provisioningTo display information about an easy secure device provisioning (SDP) operation, use thedebugcryptoprovisioningcommand in privileged EXECmode. To disable debugging output, use the no formof this command.
debug crypto provisioning
no debug crypto provisioning
Syntax Description This command has no arguments or keywords.
Command Default Debugging is not enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.3(8)T
This command replaced the debugcryptowuicommand.12.3(14)T
Usage Guidelines For more detailed information about authentication, authorization, and accounting (AAA), use thedebugaaaauthorization command.
Examples The following is sample output from the debugcryptoprovisioningcommand. The output includes explanationsof the process.
Router# debug crypto provisioningPetitioner device! The user starts the Welcome phase.Nov 7 03:15:48.171: CRYPTO_WUI_TTI: received welcome get request.! The router generates a Rivest, Shamir, and Adelman (RSA) keypair for future enrollment.Nov 7 03:15:48.279: CRYPTO_WUI_TTI: keyhash 'A506BE3B83C6F4B4A6EFCEB3D584AACA'! The TTI transaction is completed.Nov 7 03:16:10.607: CRYPTO_WUI_TTI: received completion post request.Registrar device!. During the introduction phase, the browser prompts for login information.06:39:18: CRYPTO_WUI_TTI: received introduction post request.06:39:18: CRYPTO_WUI_TTI: checking AAA authentication (ipsecca_script_aaalist, ttiuser)! This happens if the user types in the wrong username or password.06:39:19: CRYPTO_WUI_TTI: authentication declined by AAA, or AAA server not found - 0x306:39:19: CRYPTO_WUI_TTI: aaa query fails!! The user re-enters login information.06:39:19: CRYPTO_WUI_TTI: received introduction post request.06:39:19: CRYPTO_WUI_TTI: checking AAA authentication (ipsecca_script_aaalist, ttiuser)06:39:20: CRYPTO_WUI_TTI: checking AAA authorization (ipsecca_script_aaalist, ttiuser)! The login attempt succeeds and authorization information is retrieved from the AAA database.06:39:21: CRYPTO_WUI_TTI: aaa query ok!
Cisco IOS Debug Command Reference - Commands A through D 539
debug clns esis events through debug dbconn tcpdebug crypto provisioning
! These attributes are inserted into the configuration template.06:39:21: CRYPTO_WUI_TTI: building TTI av pairs from AAA attributes06:39:21: CRYPTO_WUI_TTI: "subjectname" = "CN=user, O=company, C=country"06:39:21: CRYPTO_WUI_TTI: "$1" = "ntp server 192.0.2.1"06:39:21: CRYPTO_WUI_TTI: "$2" = "hostname user-vpn"! The registrar stores this subject name and overrides the subject name in the subsequentenrollment request.06:39:21: CRYPTO_WUI_TTI: subjectname=CN=user, O=company, C=country! The registrar stores this key information so that it may be used to automatically grantthe subsequent enrollment request.06:39:21: CRYPTO_WUI_TTI: key_hash=A506BE3B83C6F4B4A6EFCEB3D584AACA
Related Commands DescriptionCommand
Authenticates the introducer in an SDP operation.authentication list (tti-registrar)
Specifies the appropriate authorized fields for thecertificate subject name and list of template variablesto be expanded into the Cisco IOS CLI snippet thatis sent back to the petitioner in an SDP operation.
authorization list (tti-registrar)
Displays information on AAA TACACS+authorization.
debug aaa authorization
Specifies a remote URL for a Cisco IOS CLIconfiguration template.
template config
Establishes a template username and password toaccess the configuration template on the file system.
template username
Cisco IOS Debug Command Reference - Commands A through D540
debug clns esis events through debug dbconn tcpdebug crypto provisioning
debug crypto sesmgmtTo show connection setup messages and their flow through the router, use the debugcryptosesmgmtcommandin privileged EXEC mode. To disable debugging output, use the no form of this command.
debug crypto sesmgmt
no debug crypto sesmgmt
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines Encryption and authentication are provided by a software service on the router called a cryptoengine. Thecrypto engine performs authentication through Digital Signature Standard (DSS) public and private keys whena connection is set up. DSS is a means of sending a "signature" at the end of a message that positively identifiesthe author of the message. The signature cannot be forged or duplicated by others, so whoever receives amessage with a DSS signature knows exactly who sent the message.
When connections are not completing, use the debugcryptosesmgmt command to follow the progress ofconnection messages as a first step in diagnosing the problem. You see a record of each connection messageas the router discovers it, and can track its progress through the necessary signing, verifying, and encryptionsession setup operations. Other significant connection setup events, such as the pregeneration of Diffie-Hellmanpublic numbers, are also shown. For information on Diffie-Hellman public numbers, refer to the Cisco IOSSecurity Configuration Guide .
Also use the showcryptoconnections command to display additional information on connections.
Examples The following is sample output from the debugcryptosesmgmt command. The first shows messages from arouter that initiates a successful connection. The second shows messages from a router that receives aconnection.
Router# debug crypto sesmgmtCRYPTO: Dequeued a message: Inititate_ConnectionCRYPTO: DH gen phase 1 status for conn_id 2 slot 0:OKCRYPTO: Signing done. Status:OKCRYPTO: ICMP message sent: s=172.21.114.163, d=172.21.114.162CRYPTO-SDU: send_nnc_req: NNC Echo Request sentCRYPTO: Dequeued a message: CRMCRYPTO: DH gen phase 2 status for conn_id 2 slot 0:OKCRYPTO: Verify done. Status=OKCRYPTO: Signing done. Status:OKCRYPTO: ICMP message sent: s=172.21.114.163, d=172.21.114.162CRYPTO-SDU: recv_nnc_rpy: NNC Echo Confirm sentCRYPTO: Create encryption key for conn_id 2 slot 0:OKCRYPTO: Replacing -2 in crypto maps with 2 (slot 0)Router# debug crypto sesmgmtCRYPTO: Dequeued a message: CIMCRYPTO: Verify done. Status=OKCRYPTO: DH gen phase 1 status for conn_id 1 slot 0:OKCRYPTO: DH gen phase 2 status for conn_id 1 slot 0:OKCRYPTO: Signing done. Status:OKCRYPTO: ICMP message sent: s=172.21.114.162, d=172.21.114.163CRYPTO-SDU: act_on_nnc_req: NNC Echo Reply sent
Cisco IOS Debug Command Reference - Commands A through D 541
debug clns esis events through debug dbconn tcpdebug crypto sesmgmt
CRYPTO: Create encryption key for conn_id 1 slot 0:OKCRYPTO: Replacing -2 in crypto maps with 1 (slot 0)CRYPTO: Dequeued a message: CCMCRYPTO: Verify done. Status=OK
Related Commands DescriptionCommand
Displays DSS public key exchange messages.debug crypto key-exchange
Cisco IOS Debug Command Reference - Commands A through D542
debug clns esis events through debug dbconn tcpdebug crypto sesmgmt
debug csm neatTo turn on debugging for all Call Switching Module (CSM) Voice over IP (VoIP) calls, use thedebugcsmneatcommand in privileged EXEC mode. To disable debugging output, use the no form of thiscommand.
debug csm neat [slot| dspm| dsp| dsp-channel]
no debug csm neat [slot| dspm| dsp| dsp-channel]
Syntax Description (Optional) Identifies the location of a particular digitalsignal processor (DSP) channel.
slot | dspm | dsp | dsp-channel
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.4(9)T
This command is supported in the Cisco IOS Release 12.2SX train. Supportin a specific 12.2SX release of this train depends on your feature set, platform,and platform hardware.
12.2SX
Usage Guidelines The debugcsmneatcommand turns on debugging for all CSM VoIP calls. If no arguments are specified,debugging is enabled for all voice calls.
The debugcsmneat command does not display any information if you try to debug ISDN voice calls. Toview debugging information about ISDN calls, use the debugcdapi command.
Note
The nodebugcmsneat command turns off debugging information for all voice calls.
If the slot,dspm,dsp,ordsp-channel arguments are specified (if the specified DSP channel is engaged in a CSMcall), CSM call-related debugging information is turned on for this channel. The noform of this commandturns off debugging for that particular channel.
Examples The following examples show sample output from the debugcsmneat command. The following shows thatCSM has received an event from ISDN.
Router# debug csm neatMarch 18 04:05:07.052: EVENT_FROM_ISDN::dchan_idb=0x60D7B6B8, call_id=0xCF, ces=0x1bchan=0x0, event=0x1, cause=0x0The table below describes the significant fields shown in the display.
Cisco IOS Debug Command Reference - Commands A through D 543
debug clns esis events through debug dbconn tcpdebug csm neat
Table 65: debug csm neat Field Descriptions
DescriptionField
Indicates the address of the hardware interfacedescription block (IDB) for the D channel.
dchan_idb
Indicates the call ID assigned by ISDN.call_id
Indicates the call ID assigned by ISDNcall-id
Indicates the number of the B channel assigned forthis call
bchan
Indicates the ISDN event causecause
The following example shows that CSM has allocated the CSM voice control block for the DSP device onslot 1 port 10 for this call.
March 18 04:05:07.052: VDEV_ALLOCATE: slot 1 and port 10 is allocated.In this example, CSM must first allocate the CSM voice control block to initiate the state machine. After thevoice control block has been allocated, CSM obtains from the DSP ResourceManager the actual DSP channelthat will be used for the call. At that point, CSMwill switch to the actual logical port number. The slot numberin this example refers to the physical slot on the Cisco AS5400 access server. The port number is the logicalDSP number interpreted as listed in the table below.
Table 66: Logical DSP Numbers
Physical DSP ChannelLogical Port
DSP channel 1DSP 1DSPRM 10
DSP channel 2DSP 1DSPRM 11
DSP channel 1DSP 2DSPRM 12
DSP channel 2DSP 2DSPRM 13
DSP channel 1DSP 3DSPRM 14
DSP channel 2DSP 3DSPRM 15
DSP channel 1DSP 4DSPRM 16
DSP channel 2DSP 4DSPRM 17
DSP channel 1DSP 5DSPRM 18
DSP channel 2DSP 5DSPRM 19
Cisco IOS Debug Command Reference - Commands A through D544
debug clns esis events through debug dbconn tcpdebug csm neat
Physical DSP ChannelLogical Port
DSP channel 1DSP 6DSPRM 110
DSP channel 2DSP 6DSPRM 111
DSP channel 1DSP 1DSPRM 212
DSP channel 2DSP 1DSPRM 213
DSP channel 1DSP 2DSPRM 214
DSP channel 2DSP 2DSPRM 215
DSP channel 1DSP 3DSPRM 216
DSP channel 2DSP 3DSPRM 217
DSP channel 1DSP 4DSPRM 218
DSP channel 2DSP 4DSPRM 219
DSP channel 1DSP 5DSPRM 220
DSP channel 2DSP 5DSPRM 221
DSP channel 1DSP 6DSPRM 222
DSP channel 2DSP 6DSPRM 223
DSP channel 1DSP 1DSPRM 548
DSP channel 2DSP 1DSPRM 549
DSP channel 1DSP 2DSPRM 550
DSP channel 2DSP 2DSPRM 551
DSP channel 1DSP 3DSPRM 552
DSP channel 2DSP 3DSPRM 553
DSP channel 1DSP 4DSPRM 554
DSP channel 2DSP 4DSPRM 555
DSP channel 1DSP 5DSPRM 556
DSP channel 2DSP 5DSPRM 557
Cisco IOS Debug Command Reference - Commands A through D 545
debug clns esis events through debug dbconn tcpdebug csm neat
Physical DSP ChannelLogical Port
DSP channel 1DSP 6DSPRM 558
DSP channel 2DSP 6DSPRM 559
The following example shows that the function csm_vtsp_init_tdm() has been called with a voice controlblock of address 0x60B8562C. This function will be called only when the call is treated as a voice call.
March 18 04:05:07.052: csm_vtsp_init_tdm (voice_vdev=0x60B8562C)The following example shows that CSM has obtained a DSP channel from the DSP Resource Manager:
March 18 04:05:07.052: csm_vtsp_init_tdm: dsprm_tdm_allocate: tdm slot 1, dspm 2, dsp 5,dsp_channel 1csm_vtsp_init_tdm: dsprm_tdm_allocate: tdm stream 5, channel 9, bank 0,bp_channel 10The table below describes the significant fields shown in the DSP channel initialized TDM display.
Table 67: debug csm neat TDM Channel Field Descriptions
DescriptionField
Indicates the physical DSP channel that will be usedfor this call.
TDM slot 1, dspm 2, dsp 5, dsp_channel 1
Indicates the on-chip and backplane TDM channelassigned to this DSP channel. Stream 5, channel 9gives the on-chip TDM channel mapped to the DSP;bank 0, bp_channel 10 means that the backplanestream 0 and backplane channel #1 are assigned tothis DSP.
TDM stream 5, channel 9, bank 0, bp_channel 10
The following shows that CSM received an incoming call event from ISDN:
March 18 04:05:07.052: EVENT_FROM_ISDN:(00CF): DEV_INCALL at slot 1 and port 20Slot 1, port 20 means the logical DSP channel 20 (mapped to DSPRM 2, DSP 5, DSP channel 1).
The following shows that the DEV_INCALL message been translated into a CSM_EVENT_ISDN_CALLmessage:
March 18 04:05:07.052: CSM_PROC_IDLE: CSM_EVENT_ISDN_CALL at slot 1, port 20This message is passed to the CSM central state machine while it is in the CSM_IDLE state and is in theCSM_PROC_IDLE procedure. The logical DSP channel port 20 on slot 1 is used to handle this call.
The following shows that CSM has invoked the vtsp_ic_notify() function with a CSM voice call control block0x60B8562C.
March 18 04:05:07.052: vtsp_ic_notify : (voice_vdev= 0x60B8562C)Inside this function, CSM will send a SETUP INDICATION message to the VTSP. This function will beinvoked only if the call is a voice call.
Cisco IOS Debug Command Reference - Commands A through D546
debug clns esis events through debug dbconn tcpdebug csm neat
The following shows that CSM received a SETUP INDICATION RESPONSE message from the VTSP asan acknowledgment.
March 18 04:05:07.056: csm_vtsp_call_setup_resp (vdev_info=0x60B8562C, vtsp_cdb=0x60FCA114)
This means that the VTSP received the CALL SETUP INDICATION message previously sent and hasproceeded to process the call.
• vdev_info--Contains the address of the CSM voice data block.
• vtsp_cdb--Contains the address of the VTSP call control block.
The following shows that CSM received a CALL CONNECT message from the VTSP:
March 18 04:05:07.596: csm_vtsp_call_connect (vtsp_cdb=0x60FCA114, voice_vdev=0x60B8562C)This indicates that the VTSP received a CONNECT message for the call leg initiated to the Internet side.
• vtsp_cdb--Contains the address of the VTSP call control block.
• voice_vdev--Contains the address of the CSM voice data block.
The following shows that while CSM is in the CSM_IC2_RING state, it receives a SETUP INDICATIONRESPONSE from the VTSP. This message is translated into CSM_EVENT_MODEM_OFFHOOKand passedto the CSM central state machine.
March 18 04:05:07.596: CSM_PROC_IC2_RING: CSM_EVENT_MODEM_OFFHOOK at slot 1, port 20The following shows that CSM received a CONNECT message from ISDN for the call using the logical DSPchannel on slot 1 and port 20:
March 18 04:05:07.616: EVENT_FROM_ISDN:(00CF): DEV_CONNECTED at slot 1 and port 20The following shows that CSM translated the CONNECT event from ISDN into theCSM_EVENT_ISDN_CONNECTED message, which is then passed to the CSM central state machine:
March 18 04:05:07.616: CSM_PROC_IC4_WAIT_FOR_CARRIER: CSM_EVENT_ISDN_CONNECTED at slot 1,port 20The following shows that CSM received a CALL SETUP REQUEST from the VTSP:
May 16 12:22:27.580: csm_vtsp_call_setup_request (vtsp_cdb=0x60FCFA20, vtsp_sdb=0x60DFB608)
This represents a request to make an outgoing call to the PSTN.
• vtsp_cdb--Contains the address of the VTSP call control block.
• vtsp_sdb--Contains the address of the signalling data block for the signalling interface to be used to sendthe outgoing call.
The following shows that the physical DSP channel has been allocated for this outgoing call:
May 16 12:22:27.580: csm_vtsp_call_setup_request: tdm slot 1, dspm 5, dsp 4, dsp_channel 1The following shows the on-chip and backplane TDM channel assigned to this DSP channel:
May 16 12:22:27.580: csm_vtsp_call_setup_request: tdm stream 5, channel 25, bank 0, bp_channel27In this sample output, tdm stream 5, channel 25, bank 0, bp_channel 27 indicates the on-chip and backplaneTDM channel assigned to this DSP channel. Stream 5, channel 25 gives the on-chip TDM channel mapped
Cisco IOS Debug Command Reference - Commands A through D 547
debug clns esis events through debug dbconn tcpdebug csm neat
to the DSP; bank 0, bp_channel 27 means that the backplane stream 0 and backplane channel 1 are assignedto this DSP.
The following shows the calling number and the called number for this call.
May 16 12:22:27.580: csm_vtsp_call_setup_request: calling number: 10001, called number:30001The following shows that the CALL SETUP REQUEST from the VTSP has been translated into the 'CSM_EVENT_MODEM_OFFHOOK message and is passed to the CSM central state machine:
May 16 12:22:27.580: CSM_PROC_IDLE: CSM_EVENT_MODEM_OFFHOOK at slot 1, port 54The logical DSP channel number for the DSP (slot 1, port 54) is now displayed, which maps to the physicalDSP channel slot 1, dspm 5, dsp 4, dsp_channel 1.
The following shows that CSM collected all the digits for dialing out:
May 16 12:22:27.580: CSM_PROC_OC3_COLLECT_ALL_DIGIT: CSM_EVENT_GET_ALL_DIGITS at slot 1,port 54For PRI and for applications that do not require digit collection of outdialing digits (for example, voice calls),the intermediate digit collection states are omitted and the CSM state machine moves to this state directly,pretending that the digit collection has been done.
The following shows an information message:
March 16 12:22:27.580: CSM_PROC_OC3_COLLECT_ALL_DIGIT: called party num: (30001) at slot1, port 54The following shows that CSM attempts to find a free signalling D channel to direct the outgoing call:
March 16 12:22:27.580: csm_vtsp_check_dchan (voice_vdev=0x60B8562C)March 16 12:22:27.580: csm_vtsp_check_dchan (vtsp requested dchan=0x60D7ACB0,dchan_idb=0x60E8ACF0)March 16 12:22:27.580: csm_vtsp_check_dchan (voice_vdev=0x60B8562C)March 16 12:22:27.580: csm_vtsp_check_dchan (vtsp requested dchan=0x60D7ACB0,dchan_idb=0x60D7ACB0)In the case of voice calls, the free signaling D channel must match the voice interface specified inside thesignalling data block (vtsp_sdb) passed from the VTSP.
The following shows that CSM has received an event from ISDN:
March 16 12:22:27.624: EVENT_FROM_ISDN::dchan_idb=0x60D7ACB0, call_id=0xA121, ces=0x1bchan=0x1E, event=0x3, cause=0x0In this sample output:
• dchan_idb--Indicates the address of the hardware IDB for the D channel
• call_id--Indicates the call id assigned by ISDN
• bchan--Indicates the number of the B channel assigned for this call
• cause--Indicates the ISDN event cause
The following shows that CSM has received a CALL PROCEEDING message from ISDN.
March 16 12:22:27.624: EVENT_FROM_ISDN:(A121): DEV_CALL_PROC at slot 1 and port 54The following shows that the CALL PROCEEDING event received from ISDN has been interpreted as aCSM_EVENT_ISDN_BCHAN_ASSIGNED message:
March 16 12:22:27.624: CSM_PROC_OC4_DIALING: CSM_EVENT_ISDN_BCHAN_ASSIGNED at slot 1, port54
Cisco IOS Debug Command Reference - Commands A through D548
debug clns esis events through debug dbconn tcpdebug csm neat
ISDN has assigned a B channel for this outgoing call. This B channel must be on the same PRI span as thesignalling D channel allocated previously.
The following shows that the csm_vtsp_setup_for_oc function is called:
March 16 12:22:27.624: csm_vtsp_setup_for_oc (voice_vdev=0x60B8562C)This is invoked when an outgoing call initiated by the VTSP receives a response from the ISDN stack.
The following shows that ISDN has sent a CONNECT message to CSM indicating that the call leg to thePSTN side has been established:
March 16 12:22:28.084: EVENT_FROM_ISDN::dchan_idb=0x60D7ACB0, call_id=0xA121, ces=0x1bchan=0x1E, event=0x4, cause=0x0
March 16 12:22:28.084: EVENT_FROM_ISDN:(A121): DEV_CONNECTED at slot 1 and port 54The following shows that while CSM is in the OC5_WAIT_FOR_CARRIER state, it has received the'CONNECT'message from ISDN and has translated it into the CSM_EVENT_ISDN_CONNECTEDmessage,which is passed to the CSM central state machine:
March 16 12:22:28.084: CSM_PROC_OC5_WAIT_FOR_CARRIER: CSM_EVENT_ISDN_CONNECTED at slot 1,port 54The following shows that the function vtsp_confirm_oc() has been called:
March 16 12:22:28.084: vtsp_confirm_oc : (voice_vdev= 0x60B8562C)This is invoked after CSM received the CONNECT message from ISDN. CSM sends a confirmation of theCONNECT to the VTSP.
Cisco IOS Debug Command Reference - Commands A through D 549
debug clns esis events through debug dbconn tcpdebug csm neat
debug csm tgrmTo view Call Switching Module (CSM) trunk group resource manager information, use thedebugcsmtgrmcommand in privileged EXEC mode. To disable debugging output, use the no form of thiscommand.
debug csm tgrm
no debug csm tgrm
Syntax Description This command has no arguments or keywords.
Command Default Disabled
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(11)T
This commandwas integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines Disable console logging and use buffered logging before using the debug csm tgrm command. Using thedebug csm tgrm command generates a large volume of debugs, which can affect router performance.
Examples The following is sample output from the debug csm tgrm command. The output shows that the call type isvoice, the direction is incoming, and the call is accepted by the CSM.
Router# debug csm tgrm
Router#00:02:25:CSM-TGRM:csm_rx_cas_event_from_neat(EVENT_DIAL_IN) - c(T1 7/1:1:3) call_type=VOICE,dir=INCOMINGRouter#00:02:30:CSM-TGRM:csm_proc_ic3_wait_for_res_resp() c(T1 7/1:1:3) VOICE <ACCEPTED !!>The table below describes the significant fields shown in the display.
Table 68: debug csm tgrm Field Descriptions
DescriptionField
Type of call: VOICE or MODEM.call_type
Direction of the call: INCOMING or OUTGOING.dir
Cisco IOS Debug Command Reference - Commands A through D550
debug clns esis events through debug dbconn tcpdebug csm tgrm
Cisco IOS Debug Command Reference - Commands A through D 551
debug clns esis events through debug dbconn tcpdebug csm tgrm
debug csm voiceTo turn on debugging for all Call Switching Module (CSM) Voice over IP (VoIP) calls, use thedebugcsmvoicecommand in privileged EXEC mode. To disable debugging output, use the no form of thiscommand.
debug csm voice [slot| dspm| dsp| dsp-channel]
no debug csm voice [slot| dspm| dsp| dsp-channel]
Syntax Description (Optional) Identifies the location of a particular digitalsignal processor (DSP) channel.
slot | dspm | dsp | dsp-channel
Command Modes Privileged EXEC
Usage Guidelines The debugcsmvoicecommand turns on debugging for all CSM VoIP calls. If this command has no keywordspecified, then debugging is enabled for all voice calls.
The debugcsmvoice command does not display any information if you try to debug isdn voice calls. Toview debugging information about isdn calls, use the debugcdapi command.
Note
The nodebugcmsvoice command turns off debugging information for all voice calls.
If the slot|dspm|dsp|dsp-channel argument is specified, then (if the specified DSP channel is engaged in aCSM call) CSM call-related debugging information will be turned on for this channel. The noform of thiscommand turns off debugging for that particular channel.
Examples The following examples show sample output from the debugcsmvoice command. The following shows thatCSM has received an event from ISDN.
Router# debug csm voiceOct 18 04:05:07.052: EVENT_FROM_ISDN::dchan_idb=0x60D7B6B8, call_id=0xCF, ces=0x1bchan=0x0, event=0x1, cause=0x0In this example, terms are explained as follows:
• dchan_idb--Indicates the address of the hardware interface description block (IDB) for the D channel
• call_id--Indicates the call ID assigned by ISDN
• bchan--Indicates the number of the B channel assigned for this call
• cause--Indicates the ISDN event cause
Cisco IOS Debug Command Reference - Commands A through D552
debug clns esis events through debug dbconn tcpdebug csm voice
The following shows that CSM has allocated the CSM voice control block for the DSP device on slot 1 port10 for this call.
Oct 18 04:05:07.052: VDEV_ALLOCATE: slot 1 and port 10 is allocated.This AS5300 access server might not be actually used to handle this call. CSM must first allocate the CSMvoice control block to initiate the state machine. After the voice control block has been allocated, CSM obtainsfrom the DSP Resource Manager the actual DSP channel that will be used for the call. At that point, CSMwill switch to the actual logical port number. The slot number refers to the physical slot on the AS5300 accessserver. The port number is the logical DSP number interpreted as listed in the table below.
Table 69: Logical DSP Numbers
Physical DSP ChannelLogical Port Number
DSPRM 1, DSP 1, DSP channel 1Port 0
DSPRM 1, DSP 1, DSP channel 2Port 1
DSPRM 1, DSP 2, DSP channel 1Port 2
DSPRM 1, DSP 2, DSP channel 2Port 3
DSPRM 1, DSP 3, DSP channel 1Port 4
DSPRM 1, DSP 3, DSP channel 2Port 5
DSPRM 1, DSP 4, DSP channel 1Port 6
DSPRM 1, DSP 4, DSP channel 2Port 7
DSPRM 1, DSP 5, DSP channel 1Port 8
DSPRM 1, DSP 5, DSP channel 2Port 9
DSPRM 1, DSP 6, DSP channel 1Port 10
DSPRM 1, DSP 6, DSP channel 2Port 11
DSPRM 2, DSP 1, DSP channel 1Port 12
DSPRM 2, DSP 1, DSP channel 2Port 13
DSPRM 2, DSP 2, DSP channel 1Port 14
DSPRM 2, DSP 2, DSP channel 2Port 15
DSPRM 2, DSP 3, DSP channel 1Port 16
DSPRM 2, DSP 3, DSP channel 2Port 17
DSPRM 2, DSP 4, DSP channel 1Port 18
Cisco IOS Debug Command Reference - Commands A through D 553
debug clns esis events through debug dbconn tcpdebug csm voice
Physical DSP ChannelLogical Port Number
DSPRM 2, DSP 4, DSP channel 2Port 19
DSPRM 2, DSP 5, DSP channel 1Port 20
DSPRM 2, DSP 5, DSP channel 2Port 21
DSPRM 2, DSP 6, DSP channel 1Port 22
DSPRM 2, DSP 6, DSP channel 2Port 23
DSPRM 5, DSP 1, DSP channel 1Port 48
DSPRM 5, DSP 1, DSP channel 2Port 49
DSPRM 5, DSP 2, DSP channel 1Port 50
DSPRM 5, DSP 2, DSP channel 2Port 51
DSPRM 5, DSP 3, DSP channel 1Port 52
DSPRM 5, DSP 3, DSP channel 2Port 53
DSPRM 5, DSP 4, DSP channel 1Port 54
DSPRM 5, DSP 4, DSP channel 2Port 55
DSPRM 5, DSP 5, DSP channel 1Port 56
DSPRM 5, DSP 5, DSP channel 2Port 57
DSPRM 5, DSP 6, DSP channel 1Port 58
DSPRM 5, DSP 6, DSP channel 2Port 59
The following shows that the function csm_vtsp_init_tdm() has been called with a voice control block ofaddress 0x60B8562C. This function will be called only when the call is treated as a voice call.
Oct 18 04:05:07.052: csm_vtsp_init_tdm (voice_vdev=0x60B8562C)The following shows that CSM has obtained a DSP channel from the DSP Resource Manager:
Oct 18 04:05:07.052: csm_vtsp_init_tdm: dsprm_tdm_allocate: tdm slot 1, dspm 2, dsp 5,dsp_channel 1csm_vtsp_init_tdm: dsprm_tdm_allocate: tdm stream 5, channel 9, bank 0,bp_channel 10The DSP channel has the following initialized TDM channel information:
• TDM slot 1, dspm 2, dsp 5, dsp_channel 1--Indicates the physical DSP channel that will be used for thiscall.
Cisco IOS Debug Command Reference - Commands A through D554
debug clns esis events through debug dbconn tcpdebug csm voice
• TDM stream 5, channel 9, bank 0, bp_channel 10--Indicates the on-chip and backplane TDM channelassigned to this DSP channel. Stream 5, channel 9 gives the on-chip TDM channel mapped to the DSP;bank 0, bp_channel 10 means that the backplane stream 0 and backplane channel #1 are assigned to thisDSP.
The following shows that CSM has received an incoming call event from ISDN:
Oct 18 04:05:07.052: EVENT_FROM_ISDN:(00CF): DEV_INCALL at slot 1 and port 20Slot 1, port 20 means the logical DSP channel 20 (mapped to DSPRM 2, DSP 5, DSP channel 1).
The following shows that the DEV_INCALLmessage has been translated into a CSM_EVENT_ISDN_CALLmessage:
Oct 18 04:05:07.052: CSM_PROC_IDLE: CSM_EVENT_ISDN_CALL at slot 1, port 20This message is passed to the CSM central state machine while it is in the CSM_IDLE state and is in theCSM_PROC_IDLE procedure. The logical DSP channel port 20 on slot 1 is used to handle this call.
The following shows that CSM has invoked the vtsp_ic_notify() function with a CSM voice call control block0x60B8562C.
Oct 18 04:05:07.052: vtsp_ic_notify : (voice_vdev= 0x60B8562C)Inside this function, CSM will send a SETUP INDICATION message to the VTSP. This function will beinvoked only if the call is a voice call.
The following shows that CSM has received a SETUP INDICATION RESPONSE message from the VTSPas an acknowledgment.
Oct 18 04:05:07.056: csm_vtsp_call_setup_resp (vdev_info=0x60B8562C, vtsp_cdb=0x60FCA114)This means that the VTSP has received the CALL SETUP INDICATION message previously sent and hasproceeded to process the call.
• vdev_info--Contains the address of the CSM voice data block.
• vtsp_cdb--Contains the address of the VTSP call control block.
The following shows that CSM has received a CALL CONNECT message from the VTSP:
Oct 18 04:05:07.596: csm_vtsp_call_connect (vtsp_cdb=0x60FCA114, voice_vdev=0x60B8562C)This indicates that the VTSP has received a CONNECT message for the call leg initiated to the Internet side.
• vtsp_cdb--Contains the address of the VTSP call control block.
• voice_vdev--Contains the address of the CSM voice data block.
The following shows that while CSM is in the CSM_IC2_RING state, it receives a SETUP INDICATIONRESPONSE from the VTSP. This message is translated into CSM_EVENT_MODEM_OFFHOOKand passedto the CSM central state machine.
Oct 18 04:05:07.596: CSM_PROC_IC2_RING: CSM_EVENT_MODEM_OFFHOOK at slot 1, port 20The following shows that CSM has received a CONNECT message from ISDN for the call using the logicalDSP channel on slot 1 and port 20:
Oct 18 04:05:07.616: EVENT_FROM_ISDN:(00CF): DEV_CONNECTED at slot 1 and port 20
Cisco IOS Debug Command Reference - Commands A through D 555
debug clns esis events through debug dbconn tcpdebug csm voice
The following shows that CSM has translated the CONNECT event from ISDN into theCSM_EVENT_ISDN_CONNECTED message, which is then passed to the CSM central state machine:
Oct 18 04:05:07.616: CSM_PROC_IC4_WAIT_FOR_CARRIER: CSM_EVENT_ISDN_CONNECTED at slot 1,port 20The following shows that CSM has received a CALL SETUP REQUEST from the VTSP:
May 16 12:22:27.580: csm_vtsp_call_setup_request (vtsp_cdb=0x60FCFA20, vtsp_sdb=0x60DFB608)
This represents a request to make an outgoing call to the PSTN.
• vtsp_cdb--Contains the address of the VTSP call control block.
• vtsp_sdb--Contains the address of the signalling data block for the signalling interface to be used to sendthe outgoing call.
The following shows that the physical DSP channel has been allocated for this outgoing call:
May 16 12:22:27.580: csm_vtsp_call_setup_request: tdm slot 1, dspm 5, dsp 4, dsp_channel 1The following shows the on-chip and backplane TDM channel assigned to this DSP channel:
May 16 12:22:27.580: csm_vtsp_call_setup_request: tdm stream 5, channel 25, bank 0, bp_channel27In this sample output, tdm stream 5, channel 25, bank 0, bp_channel 27 indicates the on-chip and backplaneTDM channel assigned to this DSP channel. Stream 5, channel 25 gives the on-chip TDM channel mappedto the DSP; bank 0, bp_channel 27 means that the backplane stream 0 and backplane channel 1 are assignedto this DSP.
The following shows the calling number and the called number for this call.
May 16 12:22:27.580: csm_vtsp_call_setup_request: calling number: 10001, called number:30001The following shows that the CALL SETUP REQUEST from the VTSP has been translated into the 'CSM_EVENT_MODEM_OFFHOOK message and is passed to the CSM central state machine:
May 16 12:22:27.580: CSM_PROC_IDLE: CSM_EVENT_MODEM_OFFHOOK at slot 1, port 54The logical DSP channel number for the DSP (slot 1, port 54) is now displayed, which maps to the physicalDSP channel slot 1, dspm 5, dsp 4, dsp_channel 1.
The following shows that CSM has collected all the digits for dialing out:
May 16 12:22:27.580: CSM_PROC_OC3_COLLECT_ALL_DIGIT: CSM_EVENT_GET_ALL_DIGITS at slot 1,port 54For PRI and for applications that do not require digit collection of outdialing digits (for example, voice calls),the intermediate digit collection states are omitted and the CSM state machine moves to this state directly,pretending that the digit collection has been done.
The following shows an information message:
May 16 12:22:27.580: CSM_PROC_OC3_COLLECT_ALL_DIGIT: called party num: (30001) at slot 1,port 54The following shows that CSM attempts to find a free signalling D channel to direct the outgoing call:
May 16 12:22:27.580: csm_vtsp_check_dchan (voice_vdev=0x60B8562C)May 16 12:22:27.580: csm_vtsp_check_dchan (vtsp requested dchan=0x60D7ACB0,dchan_idb=0x60E8ACF0)May 16 12:22:27.580: csm_vtsp_check_dchan (voice_vdev=0x60B8562C)May 16 12:22:27.580: csm_vtsp_check_dchan (vtsp requested dchan=0x60D7ACB0,dchan_idb=0x60D7ACB0)
Cisco IOS Debug Command Reference - Commands A through D556
debug clns esis events through debug dbconn tcpdebug csm voice
In the case of voice calls, the free signaling D channel must match the voice interface specified inside thesignalling data block (vtsp_sdb) passed from the VTSP.
The following shows that CSM has received an event from ISDN:
May 16 12:22:27.624: EVENT_FROM_ISDN::dchan_idb=0x60D7ACB0, call_id=0xA121, ces=0x1bchan=0x1E, event=0x3, cause=0x0In this sample output:
• dchan_idb--indicates the address of the hardware IDB for the D channel
• call_id--Indicates the call id assigned by ISDN
• bchan--Indicates the number of the B channel assigned for this call
• cause--Indicates the ISDN event cause
The following shows that CSM has received a CALL PROCEEDING message from ISDN.
May 16 12:22:27.624: EVENT_FROM_ISDN:(A121): DEV_CALL_PROC at slot 1 and port 54The following shows that the CALL PROCEEDING event received from ISDN has been interpreted as aCSM_EVENT_ISDN_BCHAN_ASSIGNED message:
*May 16 12:22:27.624: CSM_PROC_OC4_DIALING: CSM_EVENT_ISDN_BCHAN_ASSIGNED at slot 1, port54ISDN has assigned a B channel for this outgoing call. This B channel must be on the same PRI span as thesignalling D channel allocated previously.
The following shows that the csm_vtsp_setup_for_oc function is called:
May 16 12:22:27.624: csm_vtsp_setup_for_oc (voice_vdev=0x60B8562C)This is invoked when an outgoing call initiated by the VTSP receives a response from the ISDN stack.
The following shows that ISDN has sent a CONNECT message to CSM indicating that the call leg to thePSTN side has been established:
May 16 12:22:28.084: EVENT_FROM_ISDN::dchan_idb=0x60D7ACB0, call_id=0xA121, ces=0x1bchan=0x1E, event=0x4, cause=0x0
May 16 12:22:28.084: EVENT_FROM_ISDN:(A121): DEV_CONNECTED at slot 1 and port 54The following shows that while CSM is in the OC5_WAIT_FOR_CARRIER state, it has received the'CONNECT'message from ISDN and has translated it into the CSM_EVENT_ISDN_CONNECTEDmessage,which is passed to the CSM central state machine:
May 16 12:22:28.084: CSM_PROC_OC5_WAIT_FOR_CARRIER: CSM_EVENT_ISDN_CONNECTED at slot 1,port 54The following shows that the function vtsp_confirm_oc() has been called:
May 16 12:22:28.084: vtsp_confirm_oc : (voice_vdev= 0x60B8562C)This is invoked after CSM received the CONNECT message from ISDN. CSM sends a confirmation of theCONNECT to the VTSP.
Cisco IOS Debug Command Reference - Commands A through D 557
debug clns esis events through debug dbconn tcpdebug csm voice
debug ctl-clientTo collect debug information about the CTL client, use the debugctl-client command in privileged EXECconfiguration mode. To disable collection of debug information, use the no form of this command.
debug ctl-client
no debug ctl-client
Syntax Description This command has no arguments or keywords.
Command Default Collection of CTL client debug information is disabled.
Command Modes Privileged EXEC
Command History ModificationCisco IOS Release
This command was introduced.12.4(4)XC
This command was integrated into Cisco IOS Release 12.4(9)T.12.4(9)T
Usage Guidelines This command is used with Cisco Unified CME phone authentication.
Examples The following example shows debug messages for the CTL client:
Router# debug ctl-client
001954: .Jul 21 18:23:02.136: ctl_client_create_ctlfile:001955: .Jul 21 18:23:02.272: create_ctl_record: Function 0 Trustpoint cisco1001956: .Jul 21 18:23:02.276: create_ctl_record: record added for function 0001957: .Jul 21 18:23:02.276: create_ctl_record: Function 0 Trustpoint sast2001958: .Jul 21 18:23:02.280: create_ctl_record: record added for function 0001959: .Jul 21 18:23:02.280: create_ctl_record: Function 1 Trustpoint cisco1001960: .Jul 21 18:23:02.284: create_ctl_record: record added for function 1001961: .Jul 21 18:23:02.284: create_ctl_record: Function 3 Trustpoint cisco1001962: .Jul 21 18:23:02.288: create_ctl_record: record added for function 3001963: .Jul 21 18:23:02.288: create_ctl_record: Function 4 Trustpoint cisco1001964: .Jul 21 18:23:02.292: create_ctl_record: record added for function 4001965: .Jul 21 18:23:02.424: ctl_client_create_ctlfile: Signature length 128001966: .Jul 21 18:23:02.640: CTL File Created Successfully
Cisco IOS Debug Command Reference - Commands A through D558
debug clns esis events through debug dbconn tcpdebug ctl-client
debug ctunnelTo display debugging messages for the IP over a Connectionless Network Service (CLNS) Tunnel feature,use the debugctunnel command in privileged EXEC mode. To disable debugging messages, use the no formof this command.
debug ctunnel
no debug ctunnel
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.1(5)
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Examples As packets are sent over the virtual interface, the following type of output will appear on the console whenthe debugctunnel command is used:
Router# debug ctunnel
4d21h: CTunnel1: IPCLNP encapsulated 49.0001.1111.1111.1111.00->49.0001.2222.2222.2222.00(linktype=7, len=89)
Cisco IOS Debug Command Reference - Commands A through D 559
debug clns esis events through debug dbconn tcpdebug ctunnel
debug custom-queueTo enable custom queueing output, use the debugcustom-queue command in privileged EXEC mode. Todisable debugging output, use the no form of this command.
debug custom-queue
no debug custom-queue
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Examples The following is an example of enabling custom queueing output:
Router# debug custom-queueCustom output queueing debugging is onThe following is sample output from the debug custom-queue command:
00:27:38: CQ: Serial0 output (Pk size/Q: 232/1) Q # was 1 now 100:27:38: CQ: Serial0 output (Pk size/Q: 232/1) Q # was 1 now 100:27:38: CQ: Serial0 output (Pk size/Q: 232/1) Q # was 1 now 100:27:38: CQ: Serial0 output (Pk size/Q: 232/1) Q # was 1 now 200:27:38: CQ: Serial0 output (Pk size/Q: 232/1) Q # was 2 now 100:27:38: CQ: Serial0 output (Pk size/Q: 232/1) Q # was 1 now 100:27:38: CQ: Serial0 output (Pk size/Q: 232/1) Q # was 1 now 100:27:38: CQ: Serial0 output (Pk size/Q: 232/1) Q # was 1 now 100:27:38: CQ: Serial0 output (Pk size/Q: 232/1) Q # was 1 now 100:27:38: CQ: Serial0 output (Pk size/Q: 232/1) Q # was 1 now 100:27:38: CQ: Serial0 output (Pk size/Q: 232/1) Q # was 1 now 200:27:38: CQ: Serial0 output (Pk size/Q: 232/1) Q # was 2 now 100:27:38: CQ: Serial0 output (Pk size/Q: 232/1) Q # was 1 now 100:27:38: CQ: Serial0 output (Pk size/Q: 232/1) Q # was 1 now 100:27:38: CQ: Serial0 output (Pk size/Q: 232/1) Q # was 1 now 100:27:38: CQ: Serial0 output (Pk size/Q: 232/1) Q # was 1 now 100:27:38: CQ: Serial0 output (Pk size/Q: 232/1) Q # was 1 now 200:27:38: CQ: Serial0 output (Pk size/Q: 232/1) Q # was 2 now 100:27:38: CQ: Serial0 output (Pk size/Q: 232/1) Q # was 1 now 100:27:38: CQ: Serial0 output (Pk size/Q: 232/1) Q # was 1 now 100:27:38: CQ: Serial0 output (Pk size/Q: 232/1) Q # was 1 now 1
Related Commands DescriptionCommand
Enables priority queueing output.debug priority
Cisco IOS Debug Command Reference - Commands A through D560
debug clns esis events through debug dbconn tcpdebug custom-queue
debug cwmpTo debug the TR-069 Agent, use the debugcwmp command in privileged EXEC mode. To disable, use theno form of this command.
debug cwmp {all| error| profile| trace}
no debug cwmp {all| error| profile| trace}
Syntax Description Specifies all debug messages.all
Specifies error messages.error
Specifies the error and trace messages in the CiscoWAN Management Protocol (CWMP) profiles.
profile
Specifies trace message.trace
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.4(20)T
Examples The following is sample output from the debugcwmperror command:
Device# debug cwmp errorCWMP ERROR: cwmp_session_response_data -> HTTPC Response failed with httpc errorThe following is sample trace message output from the debugcwmpprofile command:
Device# debug cwmp profileCWMP PROFILE: cwmp_generate_connection_request_URL -> ConnectionRequestURL =http://172.27.116.170/00000C/FTX1101A1XH/cwmpThe following is sample error message output from the debugcwmpprofile command:
Device# debug cwmp profileCWMP PROFILE ERROR: validate_dhcp_pool_min_max_address -> MissingInternetGatewayDevice.LANDevice.5.LANHostConfigManagement.MaxAddressThe following is sample output from the debugcwmptrace command:
Device# debug cwmp traceCWMP: cwmp_process -> CWMP Engine started
Cisco IOS Debug Command Reference - Commands A through D 561
debug clns esis events through debug dbconn tcpdebug cwmp
debug cwsTo enable CloudWeb Security debugging, use the debug cws command in privileged EXECmode. To disableCloud Web Security debugging, use the no form of this command.
debug cws {access-list {access-list-number | extended-access-list-number | access-list-name}| control-plane|errors | events | function-trace | packet-path}
no debug cws {access-list {access-list-number | extended-access-list-number | access-list-name}| control-plane| errors | events | function-trace | packet-path}
Syntax Description Enables debugging of CloudWeb Security access control lists (ACLs).access-list
Access list number. The range is from 1 to 199.access-list-number
Extended access list number. The range is from 1300 to 2699.extended-access-list-number
Access list name.access-list-number
Enables debugging of Cloud Web Security control plane messages.control-plane
Enables debugging of Cloud Web Security errors.errors
Enables debugging of Cloud Web Security events.events
Enables debugging of Cloud Web Security function trace.function-trace
Enables debugging of Cloud Web Security packet path.packet-path
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced. This command replaces the debugcontent-scan command.
15.4(2)T
Usage Guidelines The content scanning process redirects client web traffic to the Cloud Web Security server.
You must configure ACLs by using the ip access-list extended command before you enable the debuggingof CloudWeb Security ACLs. The debug cws access-list command enables conditional debugging for CloudWeb Security. The conditional debugging does not work for existing sessions when you enable content scan;the ACL match occurs after the first packet is received.
Cisco IOS Debug Command Reference - Commands A through D562
debug clns esis events through debug dbconn tcpdebug cws
Examples The following example shows how to enable extended ACL 149 and the debugging of Cloud Web SecurityACL 149:Device(config)# ip access-list extended 149Device(config-ext-nacl)# permit ip host 10.1.0.1Device(config-ext-nacl)# endDevice# debug cws access-list 149Content-scan ACL based conditional debugging is on
The following is sample output from the debug cws access-list 149 command:Device# debug cws access-list 149
Content-scan ACL based conditional debugging is on
Feb 19 19:01:02.887: CONT-SCAN-PAK-PATH:Checking if it's a web trafficSrc IP:10.1.0.1(3646),Dst IP: 198.51.100.195(80),index:4Feb 19 19:01:02.887:Feb 19 19:01:02.887: CONT-SCAN-PAK-PATH: Populating user/usergroup infoSrc IP:10.1.0.1(3646),Dst IP: 198.51.100.195(80)Feb 19 19:01:02.887: CONT-SCAN-EVE:Username Received: defpmuser Src IP:10.1.0.1(E3E) DstIP: 198.51.100.195(50) Pak:2033BCA0Feb 19 19:01:02.887: CONT-SCAN-EVE:Usergroup from pmap Src IP:10.1.0.1(E3E) Dst IP:198.51.100.195(50) Pak:2033BCA0Feb 19 19:01:02.887: CONT-SCAN-PAK-PATH:Protocol not configuredSrc IP:10.1.0.1(3646), DstIP: 198.51.100.195(80)Feb 19 19:01:02.887: CONT-SCAN-PAK-PATH:Adding session into HashSrc IP:10.1.0.1(3646), DstIP: 198.51.100.195(80)Feb 19 19:01:02.887: CONT-SCAN-PAK-PATH:Free port equals source port for src_ip 10.1.0.1(3646)dst_ip 198.51.100.195(80) 2033BCA0Feb 19 19:01:02.887: CONT-SCAN-PAK-PATH:session enqueued 21ED1DE0 for src_ip 10.1.0.1(3646)dst_ip 198.51.100.195(80)Feb 19 19:01:02.887: CONT-SCAN-PAK-PATH:Inserting Ingress session 21ED1DE0 in hash tableat 1646 Src IP:10.1.0.1(3646), Dst IP: 198.51.100.195(80)Feb 19 19:01:02.887: CONT-SCAN-PAK-PATH:Inserting Egress session 21ED1DE0 in hash table at1629 Src IP:10.1.0.1(3646), Dst IP: 198.51.100.195(80)Feb 19 19:01:02.887: CONT-SCAN-PAK-PATH:timer wheel started for 21ED1DE0 for src_ip10.1.0.1(3646)Feb 19 19:01:02.887: CONT-SCAN-EVE:1 Usergroups from auth proxy Src IP:10.1.0.1(E3E), DstIP: 198.51.100.195(50), cs_entry:21ED1DE0Feb 19 19:01:02.887: CONT-SCAN-PAK-PATH:conx 21EE2024 ingress_fd 1073741847Feb 19 19:01:02.887: CONT-SCAN-PAK-PATH:CONT SCAN: received fd1: 1073741847 and tcp flags= 0x2, payload_len = 0Feb 19 19:01:02.887: CONT-SCAN-EVE:1 Usergroups found Src IP:10.1.0.1(E3E), Dst IP:198.51.100.195(50), cs_entry:21ED1DE0!!!
Related Commands DescriptionCommand
Enables Cloud Web Security content scanning on anegress interface.
cws out
Enables whitelisting of incoming traffic and entersCloudWeb Security whitelisting configurationmode.
cws whitelisting
Displays Cloud Web Security information.show cws
Cisco IOS Debug Command Reference - Commands A through D 563
debug clns esis events through debug dbconn tcpdebug cws
debug dampeningTo display debug trace information messages for interface dampening, use the debugdampening commandin privileged EXEC mode. To disable debugging output, use the no form of this command.
debug dampening [all| interface]
no debug dampening [all| interface]
Syntax Description (Optional) Enables trace debugging for all dampeningfeatures.
all
(Optional) Enables trace debugging for IP eventdampening.
interface
Command Default No default behavior or values.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.0(22)S
This command was integrated into Cisco IOS Release 12.2(13)T.12.2(13)T
This command was integrated into Cisco IOS Release 12.2(14)S.12.2(14)S
This command was integrated into Cisco IOS Release 12.2(18)SXD.12.2(18)SXD
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
This command was integrated into Cisco IOS Release 12.2(31)SB2.12.2(31)SB2
Examples The following sample output is similar to the output that will be displayed when the debugdampeningcommand is entered with the interface keyword. The sample output shows the following information:
• Ethernet interface 1/1 is configured with the IP Event Dampening feature. The half-life period is set to30 seconds, the reuse threshold to 500, the suppress threshold to 1000, and the restart penalty to 90.
• The shutdown command and then the noshutdown command was entered on Ethernet interface 1/1.The interface was suppressed and then reused by the IP Event Dampening feature.
Router# debug dampening interface
Cisco IOS Debug Command Reference - Commands A through D564
debug clns esis events through debug dbconn tcpdebug dampening
00:07:17:IF-EvD(Ethernet1/1):CLNS Routing reports state transition from UP to DOWN00:07:17:EvD(Ethernet1/1):charge penalty 1000, new accum. penalty 1000, flap count 100:07:17:EvD(Ethernet1/1):accum. penalty 1000, now suppressed with a reuse intervals of 3000:07:17:IF-EvD(Ethernet1/1):update CLNS Routing state to DOWN, interface is suppressed00:07:17:IF-EvD(Ethernet1/1):IP Routing reports state transition from DOWN to DOWN00:07:17:IF-EvD(Ethernet1/1):update IP Routing state to DOWN, interface is suppressed00:07:17:IF-EvD(Ethernet1/1):CLNS Routing reports state transition from DOWN to UP00:07:17:IF-EvD(Ethernet1/1):CLNS Routing reports state transition from UP to DOWN00:07:17:EvD(Ethernet1/1):accum. penalty decayed to 1000 after 0 second(s)00:07:17:EvD(Ethernet1/1):charge penalty 1000, new accum. penalty 2000, flap count 200:07:17:EvD(Ethernet1/1):accum. penalty 2000, now suppressed with a reuse intervals of 6000:07:17:IF-EvD(Ethernet1/1):CLNS Routing reports state transition from DOWN to UP00:07:17:IF-EvD(Ethernet1/1):CLNS Routing reports state transition from UP to DOWN00:07:17:EvD(Ethernet1/1):accum. penalty decayed to 2000 after 0 second(s)00:07:17:EvD(Ethernet1/1):charge penalty 1000, new accum. penalty 3000, flap count 300:07:17:EvD(Ethernet1/1):accum. penalty 3000, now suppressed with a reuse intervals of 7800:07:17:IF-EvD(Ethernet1/1):CLNS Routing reports state transition from DOWN to UP00:07:17:IF-EvD(Ethernet1/1):IP Routing reports state transition from UP to UP00:07:17:IF-EvD(Ethernet1/1):IP Routing reports state transition from UP to UP00:07:17:IF-EvD(Ethernet1/1):IP Routing reports state transition from UP to UP00:07:17:IF-EvD(Ethernet1/1):IP Routing reports state transition from UP to UP00:07:17:IF-EvD(Ethernet1/1):IP Routing reports state transition from UP to UP00:07:20:IF-EvD(Ethernet1/1):CLNS Routing reports state transition from UP to UP00:07:20:IF-EvD(Ethernet1/1):IP Routing reports state transition from UP to UP00:07:47:IF-EvD:unsuppress interfaces00:08:36:IF-EvD:unsuppress interfaces00:08:36:EvD(Ethernet1/1):accum. penalty decayed to 483 after 79 second(s)00:08:36:EvD(Ethernet1/1):accum. penalty 483, now unsuppressed00:08:36:IF-EvD(Ethernet1/1):update IP Routing state to UP, interface is not suppressed00:08:36:IF-EvD(Ethernet1/1):update CLNS Routing state to UP, interface is not suppressed00:08:36:IF-EvD(Ethernet1/1):CLNS Routing reports state transition from UP to UPThe table below describes the significant fields shown in the display.
Table 70: debug dampening Field Descriptions
DescriptionField
Displays the status of the specified interface from theperspective of the specified protocol. Interface statechanges are displayed. The interface is specifiedwithin parentheses. The protocol is specified at thebeginning of the message.
... Routing reports state transition fromUP to DOWN
Displays the penalty assigned to the flapping interfaceand amount of penalty that is added to theaccumulated penalty. The interface flap count is alsodisplayed.
charge penalty 1000, new accum. penalty 1000, flapcount 1
Displays the status of the interface, accumulatedpenalty, and configured reuse threshold.
accum. penalty 1000, now suppressed with a reuseintervals of 30
Displays the status of the specified interface. Interfacestate changes and suppression status are displayed.
update CLNS Routing state to DOWN, interface issuppressed
Displays the decay rate of the accumulated penalty.accum. penalty decayed to 1000 after 0 second(s)
Indicates that dampened interfaces have beenunsuppressed.
unsuppress interfaces
Cisco IOS Debug Command Reference - Commands A through D 565
debug clns esis events through debug dbconn tcpdebug dampening
debug data-storeTo display persistant storage device (PSD)-related debugging messages for the gateway GPRS support node(GGSN), use the debugdata-storecommand in privileged EXECmode. To disable debugging output, use theno form of this command.
debug data-store
no debug data-store
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.3(14)YU
This command was integrated into Cisco IOS Release 12.4(2)XB.12.4(2)XB
This command was integrated into Cisco IOS Release 12.4(15)T.12.4(15)T
Usage Guidelines This command displays PSD-related debugging messages for the GGSN.
Because debugging output is assigned high priority in the CPU process, it can render the system unusable.For this reason, use debug commands only to troubleshoot specific problems or during troubleshootingsessions with Cisco technical support staff. Moreover, it is best to use debug commands during periodsof lower network flows and fewer users. Debugging during these periods reduces the effect these commandshave on other users on the system.
Caution
Examples The following example configures a debugging session to check PSD-related parameters:
Router# debug data-store
Cisco IOS Debug Command Reference - Commands A through D566
debug clns esis events through debug dbconn tcpdebug data-store
debug data-store detailTo display extended details for persistent storage device (PSD)-related debugging information, use thedebugdata-storedetailcommand in privileged EXEC mode. To disable debugging output, use the no formof this command.
debug data-store detail
no debug data-store detail
Syntax Description This command has no arguments or keywords.
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.3(14)YU
This command was integrated into Cisco IOS Release 12.4(2)XB.12.4(2)XB
This command was integrated into Cisco IOS Release 12.4(15)T.12.4(15)T
Usage Guidelines This command displays PSD-related debugging messages for the GGSN.
Because debugging output is assigned high priority in the CPU process, it can render the system unusable.For this reason, use debug commands only to troubleshoot specific problems or during troubleshootingsessions with Cisco technical support staff. Moreover, it is best to use debug commands during periodsof lower network flows and fewer users. Debugging during these periods reduces the effect these commandshave on other users on the system.
Caution
Examples The following example configures a detailed PSD-related debugging session:
Router# debug data-store details
Cisco IOS Debug Command Reference - Commands A through D 567
debug clns esis events through debug dbconn tcpdebug data-store detail
Related Commands DescriptionCommand
Configures the GGSN to automatically initiate aretrieval of G-CDRs from PSDs defined in a PSDserver group.
auto-retrieve
Clears PSD-related statistics.clear data-store statistics
Displays the status of the PSD client and PSDserver-related information.
show data-store
Displays statistics related to the PSD client.show data-store statistics
Cisco IOS Debug Command Reference - Commands A through D568
debug clns esis events through debug dbconn tcpdebug data-store detail
debug dbconn allTo turn on all debug flags for Database Connection, use the debugdbconnallcommand in privileged EXECmode. To disable debugging output, use the no form of this command.
debug dbconn all
no debug dbconn all
Syntax Description This command has no arguments or keywords.
Command Default Debugging is not enabled for Database Connection.
Command Modes Privileged EXEC
Usage Guidelines The debugdbconnall command displays debug output for Advanced Program-to-Program Communication(APPC), Database Connection configuration, Distributed Relational Database Architecture (DRDA), errormessages, event traces, and TCP. The Database Connection debug flags are appc, config, drda, event, andtcp.
Examples See the sample output provided for the debug dbconn appc , debug dbconn config , debug dbconn drda, debug dbconn event , and debug dbconn tcp commands.
Related Commands DescriptionCommand
Displays APPC-related trace or error messages.debug dbconn appc
Displays trace or error messages for DatabaseConnection configuration and control blocks.
debug dbconn config
Displays error messages and stream traces for DRDA.debug dbconn drda
Displays trace or error messages for CTRC eventsrelated to DB2 communications.
debug dbconn event
Displays error messages and traces for TCP.debug dbconn tcp
Cisco IOS Debug Command Reference - Commands A through D 569
debug clns esis events through debug dbconn tcpdebug dbconn all
debug dbconn appcTo display Advanced Program-to-Program Communication (APPC)-related trace or error messages, use thedebugdbconnappc command in privileged EXEC mode. To disable debugging output, use the no form ofthis command.
debug dbconn appc
no debug dbconn appc
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines In a router with stable Database Connection, the alias_cp_name field in the trace message should not be blank.There should be no other APPC error message. You can use Advanced Peer-to-Peer Networking (APPN)debug commands with this debug command to track APPN-related errors.
Examples The following is sample output from the debugdbconnappccommand. In a normal situation, only the followingmessage is displayed:
DBCONN-APPC: alias_cp_name is "ASH"The following error messages are displayed if there is a network configuration error or other APPN-relatedproblem:
DBCONN-APPC-612C2B28: APPC error: opcode 0x1, primary_rc 0x0003,secondary_rc 0x00000004DBCONN-APPC-612C2B28: Verb block =DBCONN-APPC-612C2B28: 0001 0200 0003 0000 0000 0004 0020 100CDBCONN-APPC-612C2B28: 610A 828B 0000 0000 0000 0000 0000 0000DBCONN-APPC-612C2B28: 0000 0000 8014 0003 0000 0000 0000 0000DBCONN-APPC-612C2B28: D3E4 F6F2 E2E3 C1D9 C4C2 F240 4040 4040DBCONN-APPC-612C2B28: 4040 4040 4040 4040 4040 4040 4040 4040DBCONN-APPC-612C2B28: 4040 4040 4040 4040 4040 4040 4040 4040DBCONN-APPC-612C2B28: 4040 4040 4040 4040 4040 4040 4040 4040DBCONN-APPC-612C2B28: 4040 4040 4040 4040 0200 0000 0000 0000DBCONN-APPC-612C2B28: 0000 0000 D4C5 D9D9 C9C5 4040 4040 D7C5DBCONN-APPC-612C2B28: E3C5 D940 4040 4040 0000 0000 0000 0000DBCONN-APPC-612C2B28: 00E2 E3C1 D9E6 4BE3 D6D9 C3C8 4040 4040DBCONN-APPC-612C2B28: 4040 0000 0000 0000 0000 0000DBCONN-APPC-612C2B28: ALLOCATE verb block =DBCONN-APPC-612C2B28: 0001 0200 0003 0000 0000 0004 0020 100CDBCONN-APPC-612C2B28: 610A 828B 0000 0000 0000 0000 0000 0000DBCONN-APPC-612C2B28: 0000 0000 8014 0003 0000 0000 0000 0000DBCONN-APPC-612C2B28: D3E4 F6F2 E2E3 C1D9 C4C2 F240 4040 4040DBCONN-APPC-612C2B28: 4040 4040 4040 4040 4040 4040 4040 4040DBCONN-APPC-612C2B28: 4040 4040 4040 4040 4040 4040 4040 4040DBCONN-APPC-612C2B28: 4040 4040 4040 4040 4040 4040 4040 4040DBCONN-APPC-612C2B28: 4040 4040 4040 4040 0200 0000 0000 0000You can use the debugappncommand to obtain more information.
Cisco IOS Debug Command Reference - Commands A through D570
debug clns esis events through debug dbconn tcpdebug dbconn appc
The following message is displayed if a database connection is manually cleared and an outstanding APPCverb is pending:
DBCONN-APPC-%612C2B28: Canceling pending APPC verb 0x1
Related Commands DescriptionCommand
Turns on all debug flags for Database Connection.debug dbconn all
Displays trace or error messages for DatabaseConnection configuration and control blocks.
debug dbconn config
Displays error messages and stream traces for DRDA.debug dbconn drda
Displays trace or error messages for DatabaseConnection events.
debug dbconn event
Displays error messages and traces for TCP.debug dbconn tcp
Cisco IOS Debug Command Reference - Commands A through D 571
debug clns esis events through debug dbconn tcpdebug dbconn appc
debug dbconn configTo display trace or error messages for Database Connection configuration and control blocks, use thedebugdbconnconfigcommand in privileged EXEC mode. To disable debugging output, use the no form ofthis command.
debug dbconn config
no debug dbconn config
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines Most of the messages for Database Connection and control blocks do not report any errors. If a connectionis inactive and cannot be cleared, use this command with the debugdbconnappc,debugdbconntcp,anddebugappn commands to locate the problem. The alias_cp_name field must match the configured APPNcpname.
Examples The following is sample output from the debugdbconnconfigcommand:
Router# debug dbconn configDBCONN-CONFIG: alias_cp_name is "ASH "DBCONN-CONFIG: connection 612BDAAC matching server on 198.147.235.5:0 withrdbname=STELLADBCONN-CONFIG: APPN shutdown; clearing connection 1234abcdDBCONN-CONFIG: created server 612C2720DBCONN-CONFIG: server 612C2720 (listen 60F72E94) is activeDBCONN-CONFIG: server 612C2720 (listen 60F72E94) is activeDBCONN-CONFIG: new connection 612BDAACDBCONN-CONFIG: listen 60F72E94 accepts connection 612BDAACDBCONN-CONFIG: server 60F74614 takes connection 612BDAACDBCONN-CONFIG: listen 60F72E94 releases connection 612BDAACDBCONN-CONFIG: server 60F74614 releases connection 612BDAACDBCONN-CONFIG: deleting connection 612BDAACDBCONN-CONFIG: listen 60F72E94 abandons connection 612BDAACDBCONN-CONFIG: server 612C2720 abandons connection 612BDAACDBCONN-CONFIG: deleting server 612C2720DBCONN-CONFIG: daemon 60381738 takes zombie connection 612BDAACDBCONN-CONFIG: daemon 60381738 releases zombie connection 612BDAAC
Related Commands DescriptionCommand
Turns on all debug flags for Database Connection.debug dbconn all
Displays APPC-related trace or error messages.debug dbconn appc
Displays error messages and stream traces for DRDA.debug dbconn drda
Cisco IOS Debug Command Reference - Commands A through D572
debug clns esis events through debug dbconn tcpdebug dbconn config
DescriptionCommand
Displays trace or error messages for DatabaseConnection events.
debug dbconn event
Displays error messages and traces for TCP.debug dbconn tcp
Cisco IOS Debug Command Reference - Commands A through D 573
debug clns esis events through debug dbconn tcpdebug dbconn config
debug dbconn drdaTo display error messages and stream traces for Distributed Relational Database Architecture (DRDA), usethe debugdbconndrdacommand in privileged EXEC mode. To disable debugging output, use the no formof this command.
debug dbconn drda
no debug dbconn drda
Syntax Description This command has no arguments or keywords.
Command Default Debugging is not enabled for the dbconn subsystem.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.11.3(2)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Examples The following is sample output from the debugdbconndrdacommand:
Router# debug dbconn drda*Jun 30 16:09:32.363: DBCONN-DRDA-62008300: DSS X'006CD0410001', length 108, in chain,REQDSS, correlator 1*Jun 30 16:09:32.363: DBCONN-DRDA-62008300: OBJECT X'00661041', length 98, code point X'1041'*Jun 30 16:09:32.363: DBCONN-DRDA-62008300: OBJECT X'0020115E' in COLLECTION X'1041', length28, code point X'115E'*Jun 30 16:09:32.363: DBCONN-DRDA-62008300: OBJECT X'000C116D' in COLLECTION X'1041', length8, code point X'116D'*Jun 30 16:09:32.363: DBCONN-DRDA-62008300: OBJECT X'0013115A' in COLLECTION X'1041', length15, code point X'115A' (skipping...)
Related Commands DescriptionCommand
Turns on all debug flags for Database Connection.debug dbconn all
Displays APPC-related trace or error messages.debug dbconn appc
Displays trace or error messages for DatabaseConnection configuration and control blocks.
debug dbconn config
Cisco IOS Debug Command Reference - Commands A through D574
debug clns esis events through debug dbconn tcpdebug dbconn drda
DescriptionCommand
Displays trace or error messages for CTRC eventsrelated to DB2 communications.
debug dbconn event
Displays error messages and traces for TCP.debug dbconn tcp
Cisco IOS Debug Command Reference - Commands A through D 575
debug clns esis events through debug dbconn tcpdebug dbconn drda
debug dbconn eventTo display trace or error messages for Cisco Transaction Connection (CTRC) events related to DATABASE2(DB2) communications, use the debugdbconneventcommand in privileged EXECmode. To disable debuggingoutput, use the no form of this command.
debug dbconn event
no debug dbconn event
Syntax Description This command has no arguments or keywords.
Command Default Debugging is not enabled for the dbconn subsystem.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.11.3(2)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Examples The following examples display output from the debugdbconneventcommand in a variety of situations. Anormal trace for the debugdbconnevent displays as follows:
Router# debug dbconn eventDBCONN-EVENT: Dispatch to 60FD6C00, from 0, msg 60F754CC, msgid 6468 'dh',buffer 0.DBCONN-EVENT: [*] Post to 61134240(cn), from 60EC5470(tc), msg 611419E4,msgid 0x6372 'cr', buffer 612BF68C.DBCONN-EVENT: Flush events called for pto 61182742, pfrom 61239837.DBCONN-EVENT: Event discarded: to 61182742 (cn), from 61239837(ap), msg61339273, msgid 0x6372 'cr' buffer 0.DBCONN-EVENT: == Send to 1234abcd, from 22938acd, msg 72618394, msgid0x6372 'cr', buffer 0.If the following messages are displayed, contact Cisco technical support personnel:
DBCONN-TCPFSM-1234abcd: Cannot occur in state 2 on input 6363 ('cc')DBCONN-APPCFSM-1234abcd: Cannot occur in state 3 on input 6363 ('cc')
Related Commands DescriptionCommand
Turns on all debug flags for Database Connection.debug dbconn all
Displays APPC-related trace or error messages.debug dbconn appc
Cisco IOS Debug Command Reference - Commands A through D576
debug clns esis events through debug dbconn tcpdebug dbconn event
DescriptionCommand
Display trace or error messages for DatabaseConnection configuration and control blocks.
debug dbconn config
Displays error messages and stream traces for DRDA.debug dbconn drda
Displays error messages and traces for TCP.debug dbconn tcp
Displays the state of each debugging option.show debugging
Cisco IOS Debug Command Reference - Commands A through D 577
debug clns esis events through debug dbconn tcpdebug dbconn event
debug dbconn tcpTo display error messages and traces for TCP, use the debugdbconntcpcommand in privileged EXEC mode.To disable debugging output, use the no form of this command.
debug dbconn tcp
no debug dbconn tcp
Syntax Description This command has no arguments or keywords.
Command Default Debugging is not enabled for the dbconn subsystem.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.11.3(2)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Examples The following is sample output from the debugdbconntcpcommand:
Router# debug dbconn tcpDBCONN-TCP-63528473: tcpdriver_passive_open returned NULLDBCONN-TCP-63528473: (no memory) tcp_reset(63829482) returns 4DBCONN-TCP: tcp_accept(74625348,&error) returns tcb 63829482, error 4DBCONN-TCP: (no memory) tcp_reset(63829482) returns 4DBCONN-TCP-63528473: (open) tcp_create returns 63829482, error = 4DBCONN-TCP-63528473: tcb_connect(63829482,1.2.3.4,2010) returns 4DBCONN-TCP-63528473: (open error) tcp_reset(63829482) returns 4DBCONN-TCP-63528473: tcp_create returns 63829482, error = 4DBCONN-TCP-63528473: tcb_bind(63829482,0.0.0.0,2001) returns 4DBCONN-TCP-63528473: tcp_listen(63829482,,) returns 4DBCONN-TCP-63528473: (errors) Calling tcp_close (63829482)
Related Commands DescriptionCommand
Turns on all debug flags for Database Connection.debug dbconn all
Displays APPC-related trace or error messages.debug dbconn appc
Displays trace or error messages for DatabaseConnection configuration and control blocks.
debug dbconn config
Displays error messages and stream traces for DRDA.debug dbconn drda
Cisco IOS Debug Command Reference - Commands A through D578
debug clns esis events through debug dbconn tcpdebug dbconn tcp
DescriptionCommand
Displays trace or error messages for CTRC eventsrelated to DB2 communications.
debug dbconn event
Displays the state of each debugging option.show debugging
Cisco IOS Debug Command Reference - Commands A through D 579
debug clns esis events through debug dbconn tcpdebug dbconn tcp
Cisco IOS Debug Command Reference - Commands A through D580
debug clns esis events through debug dbconn tcpdebug dbconn tcp
debug decnet adj through debug dss ipx event
• debug decnet adj through debug dss ipx event, page 581
debug decnet adj through debug dss ipx event
Cisco IOS Debug Command Reference - Commands A through D 581
debug decnet adj
The debugdecnetadj command is not available in Cisco IOS Release 12.2(33)SXH and later Cisco IOS12.2SX releases.
Note
To display debugging information on DECnet adjacencies, use the debugdecnetadjcommand in privilegedEXEC mode. To disable debugging output, use the no form of this command.
debug decnet adj
no debug decnet adj
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC (#)
Examples The following is sample output from the debugdecnetadj command:
Router# debug decnet adjDNET-ADJ: Level 1 hello from 1.3DNET-ADJ: sending hellosDNET-ADJ: Sending hellos to all routers on interface Ethernet0, blksize 1498DNET-ADJ: Level 1 hello from 1.3DNET-ADJ: 1.5 adjacency initializingDNET-ADJ: sending triggered hellosDNET-ADJ: Sending hellos to all routers on interface Ethernet0, blksize 1498DNET-ADJ: Level 1 hello from 1.3DNET-ADJ: 1.5 adjacency upDNET-ADJ: Level 1 hello from 1.5DNET-ADJ: 1.5 adjacency down, listener timeoutThe following line indicates that the router is sending hello messages to all routers on this segment, which inthis case is Ethernet 0:
DNET-ADJ: Sending hellos to all routers on interface Ethernet0, blksize 1498The following line indicates that the router has heard a hello message from address 1.5 and is creating anadjacency entry in its table. The initial state of this adjacency will be initializing.
DNET-ADJ: 1.5 adjacency initializingThe following line indicates that the router is sending an unscheduled (triggered) hello message as a result ofsome event, such as new adjacency being heard:
DNET-ADJ: sending triggered hellosThe following line indicates that the adjacency with 1.5 is now up, or active:
DNET-ADJ: 1.5 adjacency upThe following line indicates that the adjacency with 1.5 has timed out, because no hello message has beenheard from adjacency 1.5 in the time interval originally specified in the hello message from 1.5:
DNET-ADJ: 1.5 adjacency down, listener timeout
Cisco IOS Debug Command Reference - Commands A through D582
debug decnet adj through debug dss ipx eventdebug decnet adj
The following line indicates that the router is sending an unscheduled hello message, as a result of some event,such as the adjacency state changing:
DNET-ADJ: hello update triggered by state changed in dn_add_adjacency
Cisco IOS Debug Command Reference - Commands A through D 583
debug decnet adj through debug dss ipx eventdebug decnet adj
debug decnet connectsThe debugdecnetconnects command is not available in Cisco IOS Release 12.2(33)SXH and later Cisco IOS12.2SX releases.
To display debugging information of all connect packets that are filtered (permitted or denied) by DECnetaccess lists, use the debugdecnetconnects command in privileged EXECmode. To disable debugging output,use the no form of this command.
debug decnet connects
no debug decnet connects
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC (#)
Usage Guidelines When you use connect packet filtering, it may be helpful to use the decnetaccess-group configuration commandto apply the following basic access list:
access-list 300 permit 0.0 63.1023 eq anyYou can then log all connect packets sent on interfaces to which you applied this list, in order to determinethose elements on which your connect packets must be filtered.
Packet password and account information is not logged in the debugdecnetconnects message, nor is itdisplayed by the showaccess EXEC command. If you specify password or account information in youraccess list, they can be viewed by anyone with access to the configuration of the router.
Note
Examples The following is sample output from thedebugdecnetconnects command:
Router# debug decnet connectsDNET-CON: list 300 item #2 matched src=19.403 dst=19.309 on Ethernet0: permittedsrcname="RICK" srcuic=[0,017]dstobj=42 id="USER"The table below describes significant fields shown in the output.
Table 71: debug decnet connects Field Descriptions
DescriptionField
Indicates that this is a debugdecnetconnects packet.DNET-CON:
Indicates that a packet matched the second item inaccess list 300.
list 300 item #2 matched
Indicates the source DECnet address for the packet.src=19.403
Cisco IOS Debug Command Reference - Commands A through D584
debug decnet adj through debug dss ipx eventdebug decnet connects
DescriptionField
Indicates the destination DECnet address for thepacket.
dst=19.309
Indicates the router interface on which the access listfiltering the packet was applied.
on Ethernet0:
Indicates that the access list permitted the packet.permitted
Indicates the originator user of the packet.srcname = "RICK"
Indicates the source UIC of the packet.srcuic=[0,017]
Indicates that DECnet object 42 is the destination.dstobj=42
Indicates the access user.id="USER"
Cisco IOS Debug Command Reference - Commands A through D 585
debug decnet adj through debug dss ipx eventdebug decnet connects
debug decnet events
The debugdecnetevents command is not available in Cisco IOS Release 12.2(33)SXH and later CiscoIOS 12.2SX releases.
Note
To display debugging information on DECnet events, use the debugdecneteventscommand in privilegedEXEC mode. To disable debugging output, use the no form of this command.
debug decnet events
no debug decnet events
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC (#)
Examples The following is sample output from thedebugdecnetevents command:
Router# debug decnet eventsDNET: Hello from area 50 rejected - exceeded ‘max area' parameter (45)DNET: Hello from area 50 rejected - exceeded ‘max area' parameter (45)The following line indicates that the router received a hello message from a router whose area was greaterthan the max-area parameter with which this router was configured:
DNET: Hello from area 50 rejected - exceeded'max area' parameter (45)The following line indicates that the router received a hello message from a router whose node ID was greaterthan the max-node parameter with which this router was configured:
DNET: Hello from node 1002 rejected - exceeded'max node' parameter (1000)
Cisco IOS Debug Command Reference - Commands A through D586
debug decnet adj through debug dss ipx eventdebug decnet events
debug decnet packet
The debugdecnetpacketcommand is not available in Cisco IOS Release 12.2(33)SXH and later CiscoIOS 12.2SX releases.
Note
To display debugging information on DECnet packet events, use the debugdecnetpacket command inprivileged EXEC mode. To disable debugging output, use the no form of this command.
debug decnet packet
no debug decnet packet
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC (#)
Examples The following is sample output from the debugdecnetpacket command:
Router# debug decnet packetDNET-PKT: src 1.4 dst 1.5 sending to PHASEVDNET-PKT: Packet fwded from 1.4 to 1.5, via 1.5, snpa 0000.3080.cf90, TokenRing0The following line indicates that the router is sending a converted packet addressed to node 1.5 to Phase V:
DNET-PKT: src 1.4 dst 1.5 sending to PHASEVThe following line indicates that the router forwarded a packet from node 1.4 to node 1.5. The packet is beingsent to the next hop of 1.5 whose subnetwork point of attachment (MAC address) on that interface is0000.3080.cf90.
DNET-PKT: Packet fwded from 1.4 to 1.5, via 1.5, snpa 0000.3080.cf90, TokenRing0
Cisco IOS Debug Command Reference - Commands A through D 587
debug decnet adj through debug dss ipx eventdebug decnet packet
debug decnet routing
The debugdecnetrouting command is not available in Cisco IOS Release 12.2(33)SXH and later CiscoIOS 12.2SX releases.
Note
To display all DECnet routing-related events occurring at the router, use the debugdecnetrouting commandin privileged EXEC mode. To disable debugging output, use the no form of this command.
debug decnet routing
no debug decnet routing
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC (#)
Examples The following is sample output from the debugdecnetrouting command:
Router# debug decnet routingDNET-RT: Received level 1 routing from 1.3 on Ethernet0 at 1:16:34DNET-RT: Sending routesDNET-RT: Sending normal routing updates on Ethernet0DNET-RT: Sending level 1 routing updates on interface Ethernet0DNET-RT: Level1 routes from 1.5 on Ethernet0: entry for node 5 createdDNET-RT: route update triggered by after split route pointers in dn_rt_inputDNET-RT: Received level 1 routing from 1.5 on Ethernet 0 at 1:18:35DNET-RT: Sending L1 triggered routesDNET-RT: Sending L1 triggered routing updates on Ethernet0DNET-RT: removing route to node 5The following line indicates that the router has received a level 1 update on Ethernet interface 0:
DNET-RT: Received level 1 routing from 1.3 on Ethernet0 at 1:16:34The following line indicates that the router is sending its scheduled updates on Ethernet interface 0:
DNET-RT: Sending normal routing updates on Ethernet0The following line indicates that the route will send an unscheduled update on this interface as a result ofsome event. In this case, the unscheduled update is a result of a new entry created in the routing table of theinterface.
DNET-RT: route update triggered by after split route pointers in dn_rt_inputThe following line indicates that the router sent the unscheduled update on Ethernet 0:
DNET-RT: Sending L1 triggered routesDNET-RT: Sending L1 triggered routing updates on Ethernet0The following line indicates that the router removed the entry for node 5 because the adjacency with node 5timed out, or the route to node 5 through a next-hop router was disconnected:
DNET-RT: removing route to node 5
Cisco IOS Debug Command Reference - Commands A through D588
debug decnet adj through debug dss ipx eventdebug decnet routing
debug device-sensorTo enable debugging for device sensor, use the debug device-sensor command in privileged EXEC mode.
debug device-sensor {errors | events}
Syntax Description Displays device sensor error messages.errors
Displays messages for events such as protocol packetarrivals, identity updates, and release events sent tothe session manager.
events
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.15.0(1)SE1
This command was integrated into Cisco IOS Release 15.1(1)SG.15.1(1)SG
Usage Guidelines Use the debug device-sensor command in conjunction with the debug authentication all command totroubleshoot scenarios where device sensor cache entries are not being created for the connected devices.
Examples The following is sample output from the debug device-sensor events command. The debug output showshowCisco Discovery Protocol packets and Type-Length-Values (TLVs) are received from the device connectedto the Gigabit Ethernet interface 2/1.
Device# debug device-sensor events
Device#*Nov 30 23:58:45.811: DSensor: Received cdp packet from GigabitEthernet2/1:00d0.2bdf.08a5*Nov 30 23:58:45.811: DSensor: SM returned no or invalid session label forGigabitEthernet2/1:00d0.2bdf.08a5*Nov 30 23:58:45.811: DSensor: Updating SM with identity attribute listcdp-tlv 0 00 01 00 0B 4A 41 45 30 37 34 31 31 50 53 32cdp-tlv 0 00 03 00 03 32 2F 38cdp-tlv 0 00 04 00 04 00 00 00 0Acdp-tlv 0 00 05 00 68 57 53 2D 43 32 39 34 38 20 53 6F 66 74 77 61 72 65
2C 20 56 65 72 73 69 6F 6E 20 4D 63 70 53 57 3A 20 36 2E 34 28 35 2E30 29 20 4E 6D 70 53 57 3A 20 36 2E 34 28 35 29 0A 43 6F 70 79 72 69 67 68 74 20 28 63 2920 31 39 39 35 2D 32 30 30 33 20 62 79 20 43 69 73 63 6F 20 53 79 7374 65 6D 73 2C 20 49 6E 63 2E 0Acdp-tlv 0 00 06 00 08 57 53 2D 43 32 39 34 38cdp-tlv 0 00 09 00 00cdp-tlv 0 00 0A 00 02 00 21cdp-tlv 0 00 0B 00 01 01cdp-tlv 0 00 12 00 01 00
Cisco IOS Debug Command Reference - Commands A through D 589
debug decnet adj through debug dss ipx eventdebug device-sensor
cdp-tlv 0 00 13 00 01 00cdp-tlv 0 00 14 00 00cdp-tlv 0 00 15 00 0A 06 08 2B 06 01 04 01 09 05 2Acdp-tlv 0 00 16 00 16 00 00 00 02 01 01 CC 00 04 00 00 00 0001 01 CC 00 0401 01 01 01cdp-tlv 0 00 17 00 01 00swidb 0 604702240 (0x240B0620)clid-mac-addr 0 00 D0 2B DF 08 A5*Nov 30 23:58:46.831: DSensor: Received cdp packet from GigabitEthernet2/1:00d0.2bdf.08a5exiSwitch#*Nov 30 23:58:51.171: %SYS-5-CONFIG_I: Configured from console by console
Related Commands DescriptionCommand
Displays all debugging information about theAuthentication Manager and all features.
debug authentication all
Adds the device sensor protocol data to the accountingrecords and generates additional accounting eventswhen new sensor data is detected.
device-sensor accounting
Cisco IOS Debug Command Reference - Commands A through D590
debug decnet adj through debug dss ipx eventdebug device-sensor
debug dhcpTo display debugging information about the Dynamic Host Configuration Protocol (DHCP) client activitiesand to monitor the status of DHCP packets, use the debugdhcp command in privileged EXEC mode. Todisable debugging output, use the no form of this command.
debug dhcp [detail]
no debug dhcp [detail]
Syntax Description (Optional) Displays additional debugging information.detail
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.0
The output of this commandwas enhanced to display default static routes.12.3(8)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines You can also use the debugdhcp command to monitor the subnet allocation and releasing for on-demandaddress pools.
For debugging purposes, the debugdhcpdetail command provides the most useful information such as thelease entry structure of the client and the state transitions of the lease entry. The debug output shows thescanned option values from received DHCP messages that are replies to a router request. The values of theop, htype, hlen, hops, server identifier option, xid, secs, flags, ciaddr, yiaddr, siaddr, and giaddr fields of theDHCP packet are shown in addition to the length of the options field.
Examples The following examples show and explain some of the typical debugging messages you may see when usingthe debugdhcpdetail command.
The following sample output shows when a DHCP client sends a DHCPDISCOVER broadcast message tofind its local DHCP server:
Router# debug dhcp detail00:07:16:DHCP:DHCP client process started:1000:07:16:RAC:Starting DHCP discover on Ethernet200:07:16:DHCP:Try 1 to acquire address for Ethernet200:07:16:%SYS-5-CONFIG_I:Configured from console by console00:07:19:DHCP:Shutting down from get_netinfo()00:07:19:DHCP:Attempting to shutdown DHCP Client00:07:21:DHCP:allocate request
Cisco IOS Debug Command Reference - Commands A through D 591
debug decnet adj through debug dss ipx eventdebug dhcp
00:07:21:DHCP:new entry. add to queue00:07:21:DHCP:SDiscover attempt # 1 for entry:The first seven lines of the following output show the current values stored in the lease entry structure for theclient:
00:07:21:Temp IP addr:0.0.0.0 for peer on Interface:Ethernet200:07:21:Temp sub net mask:0.0.0.000:07:21: DHCP Lease server:0.0.0.0, state:1 Selecting00:07:21: DHCP transaction id:58200:07:21: Lease:0 secs, Renewal:0 secs, Rebind:0 secs00:07:21: Next timer fires after:00:00:0300:07:21: Retry count:1 Client-ID:cisco-0010.7b6e.afd8-Et200:07:21:DHCP:SDiscover:sending 308 byte length DHCP packet00:07:21:DHCP:SDiscover 308 bytes00:07:21: B'cast on Ethernet2 interface from 0.0.0.0The following output shows the offered addresses and parameters sent to the DHCP client by the DHCP servervia a DHCPOFFER message. The messages containing the Scan field indicate the options that were scannedfrom the received BOOTP packet and the corresponding values:
00:07:23:DHCP:Received a BOOTREP pkt00:07:23:DHCP:Scan:Message type:DHCP Offer00:07:23:DHCP:Scan:Server ID Option:10.1.1.1 = A01010100:07:23:DHCP:Scan:Lease Time:18000:07:23:DHCP:Scan:Renewal time:9000:07:23:DHCP:Scan:Rebind time:15700:07:23:DHCP:Scan:Subnet Address Option:255.255.255.0The following output shows selected fields in the received BOOTP packet:
00:07:23:DHCP:rcvd pkt source:10.1.1.1, destination: 255.255.255.25500:07:23: UDP sport:43, dport:44, length:30800:07:23: DHCP op:2, htype:1, hlen:6, hops:000:07:23: DHCP server identifier:10.1.1.100:07:23: xid:582, secs:0, flags:800000:07:23: client:0.0.0.0, your:10.1.1.200:07:23: srvr: 0.0.0.0, gw:0.0.0.000:07:23: options block length:6000:07:23:DHCP Offer Message Offered Address:10.1.1.200:07:23:DHCP:Lease Seconds:180 Renewal secs: 90 Rebind secs:15700:07:23:DHCP:Server ID Option:10.1.1.100:07:23:DHCP:offer received from 10.1.1.1The following output showswhen the DHCP client sends a DHCPREQUEST broadcast message to the DHCPserver to accept the offered parameters:
00:07:23:DHCP:SRequest attempt # 1 for entry:00:07:23:Temp IP addr:10.1.1.2 for peer on Interface:Ethernet200:07:23:Temp sub net mask:255.255.255.000:07:23: DHCP Lease server:10.1.1.1, state:2 Requesting00:07:23: DHCP transaction id:58200:07:23: Lease:180 secs, Renewal:0 secs, Rebind:0 secs00:07:23: Next timer fires after:00:00:0200:07:23: Retry count:1 Client-ID:cisco-0010.7b6e.afd8-Et200:07:23:DHCP:SRequest- Server ID option:10.1.1.100:07:23:DHCP:SRequest- Requested IP addr option:10.1.1.200:07:23:DHCP:SRequest placed lease len option:18000:07:23:DHCP:SRequest:326 bytes00:07:23:DHCP:SRequest:326 bytes00:07:23: B'cast on Ethernet2 interface from 0.0.0.0The following output shows when the DHCP server sends a DHCPACK message to the client with the fullset of configuration parameters:
00:07:23:DHCP:Received a BOOTREP pkt00:07:23:DHCP:Scan:Message type:DHCP Ack00:07:23:DHCP:Scan:Server ID Option:10.1.1.1 = A01010100:07:23:DHCP:Scan:Lease Time:18000:07:23:DHCP:Scan:Renewal time:9000:07:23:DHCP:Scan:Rebind time:157
Cisco IOS Debug Command Reference - Commands A through D592
debug decnet adj through debug dss ipx eventdebug dhcp
00:07:23:DHCP:Scan:Subnet Address Option:255.255.255.000:07:23:DHCP:rcvd pkt source:10.1.1.1, destination: 255.255.255.25500:07:23: UDP sport:43, dport:44, length:30800:07:23: DHCP op:2, htype:1, hlen:6, hops:000:07:23: DHCP server identifier:10.1.1.100:07:23: xid:582, secs:0, flags:800000:07:23: client:0.0.0.0, your:10.1.1.200:07:23: srvr: 0.0.0.0, gw:0.0.0.000:07:23: options block length:6000:07:23:DHCP Ack Message00:07:23:DHCP:Lease Seconds:180 Renewal secs: 90 Rebind secs:15700:07:23:DHCP:Server ID Option:10.1.1.1Interface Ethernet2 assigned DHCP address 10.1.1.2,mask 255.255.255.000:07:26:DHCP Client Pooling:***Allocated IP address:10.1.1.200:07:26:Allocated IP address = 10.1.1.2 255.255.255.0The following output shows when a default gateway (option 3) is assigned a static IP address that is the defaultroute and that static routes were added from the DHCP server:
*Oct 2 06:22:24: Setting default_gateway to 68.8.8.1 ! This is the option 3 default gateway.*Oct 2 06:22:24: Adding default route 68.8.8.1*Oct 2 06:22:24: DHCP: Adding static route to 4.3.2.1 255.255.255.255 via 68.8.8.1*Oct 2 06:22:24: DHCP: Adding static route to 1.1.1.1 255.255.255.255 via 68.8.8.1*Oct 2 06:22:24: DHCP: Adding static route to 67.2.2.2 255.255.255.255 via 68.8.8.1Most fields are self-explanatory; however, fields that may need further explanation are described in the tablebelow.
Table 72: debug dhcp Field Descriptions
DescriptionFields
Subnet mask option (option 1).DHCP:Scan:Subnet Address Option:255.255.255.0
Value of the DHCP server ID option (option 54). Notethat this is not the same as the siaddr field, which isthe server IP address.
DHCP server identifier:1.1.1.1
srvr is the value of the siaddr field. gw is the value ofthe giaddr field.
srvr:0.0.0.0, gw:0.0.0.0
Related Commands DescriptionCommand
Enables debugging for DDNS updates.debug ip ddns update
Enables DHCP server debugging.debug ip dhcp server
Specifies a list of hosts that will receive DDNSupdates of A and PTR RRs.
host (host-list)
Enables a host to be used for DDNS updates of A andPTR RRs.
ip ddns update hostname
Specifies a method of DDNS updates of A and PTRRRs and the maximum interval between the updates.
ip ddns update method
Cisco IOS Debug Command Reference - Commands A through D 593
debug decnet adj through debug dss ipx eventdebug dhcp
DescriptionCommand
Enables DDNS updates of A RRs using the samehostname passed in the hostname and FQDN optionsby a client.
ip dhcp client update dns
Enables DDNS updates of A RRs using the samehostname passed in the hostname and FQDN optionsby a client.
ip dhcp-client update dns
Enables DDNS updates of A and PTR RRs for mostaddress pools.
ip dhcp update dns
Specifies a list of hosts that will receive DDNSupdates of A and PTR RRs.
ip host-list
Displays information about the DDNS updates.show ip ddns update
Displays information about theDDNS updatemethod.show ip ddns update method
Displays DHCP server pool statistics.show ip dhcp server pool
Displays the assigned hosts in a list.show ip host-list
Dynamically updates a DNS with A and PTR RRsfor some address pools.
update dns
Cisco IOS Debug Command Reference - Commands A through D594
debug decnet adj through debug dss ipx eventdebug dhcp
debug dhcp redundancyTo display debugging information about DHCP proxy client redundancy events, use thedebugdhcpredundancycommand in privileged EXEC mode. To disable the display of debugging output,use the no form of this command.
debug dhcp redundancy
no debug dhcp redundancy
Syntax Description This command has no arguments or keywords.
Command Default Debugging output is disabled for DHCP redundancy events.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(31)SB2
This commandwas integrated into Cisco IOSRelease 12.2(31)SRB1.12.2(31)SRB1
Examples The following example displays debug messages regarding DHCP redundancy events. The last line is outputwhen the debugdhcpredundancy command is enabled. The line indicates that the active Route Processorhas sent a dynamic lease synchronization message for IP address 10.1.1.1:
Router# debug dhcp redundancy*Mar 15 10:32:21: DHCPD: assigned IP address 10.1.1.1 to client*Mar 15 10:32:21: DHCPD: dynamic sync sent for 10.1.1.1
Related Commands DescriptionCommand
Displays debugging information about DHCP serverand relay agent redundancy events.
debug ip dhcp server redundancy
Cisco IOS Debug Command Reference - Commands A through D 595
debug decnet adj through debug dss ipx eventdebug dhcp redundancy
debug dialer eventsTo display debugging information about the packets received on a dialer interface, use thedebugdialereventscommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug dialer events
no debug dialer events
Syntax Description This command has no arguments or keywords.
Command Modes Privileged EXEC
Usage Guidelines When dial-on-demand routing (DDR) is enabled on the interface, information concerning the cause of anycall (called the Dialingcause) is displayed.
Examples In the following example, the line of output for an IP packet lists the name of the DDR interface and the sourceand destination addresses of the packet:
Router# debug dialer eventsDialing cause: Serial0: ip (s=172.16.1.111 d=172.16.2.22)The following line of output for a bridged packet lists the DDR interface and the type of packet (in hexadecimal).For information on these packet types, see the "Ethernet Type Codes" appendix of the Cisco IOS Bridgingand IBM Networking Command Reference publication.
Dialing cause: Serial1: Bridge (0x6005)Most messages are self-explanatory; however, messages that may need some explanation are described in thetable below.
Table 73: debug dialer events Message Descriptions
DescriptionMessage
Number of calls in progress (xxx) exceeds themaximum number of calls set on the interface.
Dialer0: Already xxx call(s) in progress on Dialer0,dialing not allowed
All the lines in the interface or rotary group are busy,and a packet is waiting to be sent to the destination.
Dialer0: No free dialer - starting fast idle timer
Number dialer (xxx) exceeds the load set on theinterface (yyy).
BRI0: rotary group to xxx overloaded (yyy)
No dialer profile matches xxx, the ChallengeHandshake Authentication Protocol (CHAP) nameor remote name of the remote host.
BRI0: authenticated host xxxwith no matching dialerprofile
Cisco IOS Debug Command Reference - Commands A through D596
debug decnet adj through debug dss ipx eventdebug dialer events
DescriptionMessage
No dialer map matches xxx, the CHAP name orremote name of the remote host.
BRI0: authenticated host xxxwith no matching dialermap
Dialer string or dialer pool on an interface not set.BRI0: Can’t place call, verify configuration
The table below describes the messages that the debugdialereventscommand can generate for a serial interfaceused as a V.25bis dialer for DDR.
Table 74: debug dialer events Command Message Descriptions for DDR
DescriptionMessage
Result returned from the V.25bisdialer. It is useful indebugging if calls are failing. On some hardwareplatforms, this message cannot be displayed due tohardware limitations. Possible values for thexxxxxxxxxx variable depend on the V.25bis devicewith which the router is communicating.
Serial 0: Dialer result = xxxxxxxxxx
Packet is received that should cause a call to beplaced. However, no dialer string is configured, sodialing cannot occur. This message usually indicatesa configuration problem.
Serial 0: No dialer string defined. Dialing cannotoccur.
Packet has been received that passes thedial-on-demand access lists. That packet causes phonenumber xxxxxxxxxx to be dialed.
Serial 0: Attempting to dial xxxxxxxxxx
Phone call to xxxxxxxxxx cannot be placed. Thisfailure might be due to a lack of memory, full outputqueues, or other problems.
Serial 0: Unable to dial xxxxxxxxxx
Router hangs up a call.Serial 0: disconnecting call
One of these three messages is displayed when adialer timer expires. These messages are mostlyinformational, but are useful for debugging adisconnected call or call failure.
Serial 0: idle timeout
Serial 0: re-enable timeout
Serial 0: wait for carrier timeout
Related Commands DescriptionCommand
Displays debugging information about the packetsreceived on a dialer interface.
debug decnet packet
Cisco IOS Debug Command Reference - Commands A through D 597
debug decnet adj through debug dss ipx eventdebug dialer events
debug dialer forwardingTo display debugging information about the control plane at the home gateway (HGW) for Layer 2 TunnelingProtocol (L2TP) dialout, use the debugdialerforwardingcommand in privileged EXEC mode. Theno formof this command disables debugging output.
debug dialer forwarding
no debug dialer forwarding
Syntax Description This command has no keywords or arguments.
Command Default This command is disabled by default.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2 T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines Use the debugdialerforwarding command to configure a virtual private dialout network (VPDN) on theHGW and a network access server (NAS) to dial from the HGW to the client.
An L2TP tunnel is created between the HGW and the NAS and the packets are forwarded transparently at theNAS.
Examples The following is sample output from the debugdialerforwardingcommand for dialing from the HGW to theclient.
DDR-FWD is debugdialerforwarding information. (DDR= dial-on-demand routing.)Note
Router# debug dialer forwardingDialer forwarding events debugging is onRouter# pingProtocol [ip]:Target IP address:1.1.1.3Repeat count [5]:1Datagram size [100]:Timeout in seconds [2]:Extended commands [n]:Sweep range of sizes [n]:Type escape sequence to abort.Sending 1, 100-byte ICMP Echos to 1.1.1.3, timeout is 2 seconds:
Cisco IOS Debug Command Reference - Commands A through D598
debug decnet adj through debug dss ipx eventdebug dialer forwarding
1d00h:Vi3 DDR-FWD 83093A60:event [REQUEST] state before [IDLE]1d00h:Vi3 DDR-FWD 83093A60:VPN Authorization started1d00h:Vi3 DDR-FWD 83093A60:VPN author result 11d00h:Vi3 DDR-FWD 83093A60:event [AUTHOR FOUND] state before [AUTHORIZING]1d00h:Vi3 DDR-FWD 83093A60:event [FORWARDED] state before [FORWARDING]1d00h:Vi3 DDR-FWD 83093A60:Connection is up, start LCP now*Mar 2 00:31:33:%LINK-3-UPDOWN:Interface Virtual-Access3, changed state to up.Success rate is 0 percent (0/1)R2604#*Mar 2 00:31:35:%LINEPROTO-5-UPDOWN:Line protocol on Interface Virtual-Access3, changedstate to upRouter#
Outgoing call disconnected:
Router#1d00h:Vi3 DDR-FWD 83093A60:event [VPDN DISC] state before [FORWARDED]*Mar 2 00:33:33:%LINK-3-UPDOWN:Interface Virtual-Access3, changed state to down*Mar 2 00:33:34:%LINEPROTO-5-UPDOWN:Line protocol on Interface Virtual-Access3, changedstate to down
Related Commands DescriptionCommand
Displays debugging information about events on adialer interface.
debug dialer events
Displays debugging information about packetsreceived on a dialer interface.
debug dialer packets
Cisco IOS Debug Command Reference - Commands A through D 599
debug decnet adj through debug dss ipx eventdebug dialer forwarding
debug dialer mapTo display debugging information about the creation and deletion of dynamic dialer maps, use thedebugdialermap command in privileged EXEC mode. Theno form of this command disables debuggingoutput.
debug dialer map
no debug dialer map
Syntax Description This command has no keywords or arguments.
Command Default This command is disabled by default.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.1(5.1)
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines Use the debugdialermap command to track large-scale dialout (LSDO) and incoming calls that use dynamicdialer maps. This command shows the whole trace including when the map is created and removed.
If an interface is configured for dial-on-demand routing (DDR), and a map to a specified address does notexist, then a dynamic dialer map is created and when the call disconnects, the dialer map is removed.
Do not configure a dialer string or a dialer map on the incoming interface.Note
Examples In the following sample output from the debugdialermap command, a dialer map is created when an incomingcall is connected and removed when that call is disconnected:
Router# debug dialer mapDial on demand dynamic dialer maps debugging is onIncoming call connected:
Router#*Mar 22 12:19:15.597:%LINK-3-UPDOWN:Interface BRI0/0:1, changed state to up*Mar 22 12:19:17.748:BR0/0:1 DDR:dialer_create_dynamic_map map created for 11.0.0.1*Mar 22 12:19:18.734:%LINEPROTO-5-UPDOWN:Line protocol on Interface BRI0/0:1, changed stateto up*Mar 22 12:19:21.598:%ISDN-6-CONNECT:Interface BRI0/0:1 is now connected to unknown R2604
Cisco IOS Debug Command Reference - Commands A through D600
debug decnet adj through debug dss ipx eventdebug dialer map
Incoming call disconnected:
Router#*Mar 22 12:21:15.597:%ISDN-6-DISCONNECT:Interface BRI0/0:1 disconnected from R2604, calllasted 120 seconds*Mar 22 12:21:15.645:%LINK-3-UPDOWN:Interface BRI0/0:1, changed state to down*Mar 22 12:21:15.649:BR0/0:1 DDR:dialer_remove_dynamic_map map 11.0.0.1 removed*Mar 22 12:21:16.647:%LINEPROTO-5-UPDOWN:Line protocol on Interface BRI0/0:1, changed stateto down
Related Commands DescriptionCommand
Displays debugging information about events on adialer interface.
debug dialer events
Displays debugging information about packetsreceived on a dialer interface.
debug dialer packets
Cisco IOS Debug Command Reference - Commands A through D 601
debug decnet adj through debug dss ipx eventdebug dialer map
debug dialpeer
Effective with release 12.3(8)T, the debugdialpeer command is replaced by the debugvoipdialpeercommand. See the debugvoipdialpeer command for more information.
Note
To view dial peer information, use the debugdialpeercommand in privileged EXEC mode. To disabledebugging output, use the no form of this command.
debug dialpeer
no debug dialpeer
Syntax Description This command has no arguments or keywords.
Command Default Disabled
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.2(11)T
This command was replaced by the debugvoipdialpeer command.12.3(8)T
Usage Guidelines Disable console logging and use buffered logging before using the debugdialpeer command. Using thedebugdialpeer command generates a large volume of debuggingmessages, which can affect router performance.
Examples The following is sample output for the debugdialpeer command. The output shows the destination patternconfigured on the matched dial-peer. Expanded string is the string after applying number translation to theoriginal number. It shows that dial-peer 1311 was an incoming dial-peer match. It also shows that routinglabel was att1. It shows that dial-peer 5108888 and 111399 are an outgoing dial-peer match.
Router# debug dialpeerRouter#00:22:28: Inside dpMatchCore:00:22:28: destination pattn:5108880101 expanded string:510888010100:22:28:MatchNextPeer:Peer 1311 matched00:22:28: Inside dpMatchCore:00:22:28: destination pattn:5108880101 expanded string:510888010100:22:28: Inside dpMatchCore:00:22:28: destination pattn:4088880101 expanded string:408888010100:22:28: Inside dpMatchCore:00:22:28: destination pattn:4088880101 expanded string:408888010100:22:28: dpAssociateIncomingPeer_T:Matching route labelatt1
Cisco IOS Debug Command Reference - Commands A through D602
debug decnet adj through debug dss ipx eventdebug dialpeer
00:22:28: Inside dpMatchCore:00:22:28: destination pattn:5108880101 expanded string:510888010100:22:28: dpAssociateIncomingPeer_T:Matching peer with src route label att1 failed00:22:28: Inside dpMatchCore:00:22:28: destination pattn:5108880101 expanded string:510888010100:22:28:MatchNextPeer:Peer 1311 matched00:22:28: Inside dpMatchPeersMoreArg00:22:28:dpMatchPeersMoreArg:Match Dest. pattern; called (5108880101)00:22:28: Inside dpMatchCore:00:22:28: destination paRouter#ttn:5108880101 expanded string:510888010100:22:28:MatchNextPeer:Peer 5108888 matched00:22:28:MatchNextPeer:Peer 111399 matched00:22:28:dpMatchPeersMoreArg:Result=0 after MATCH_ORIGINATEThe table below describes the significant fields shown in the display.
Table 75: debug dialpeer Field Descriptions
DescriptionField
Destination pattern configured on the dial peer.destination pattn
The string after applying number translation to theoriginal number.
expanded string
Indicates that dial-peer match is going to matchdestination pattern against the called number.
Match Dest. pattern; called
The trunk group label or carrier id that is used formatching a dial peer.
Matching route label
Indicates the dial peer tag that matched.MatchNextPeer
Indicates the result of dial peer matching algorithm:
0 = Successful 1 = More digits needed for a possiblematch -1 = No match (match failed) -2 = The digitsmatched, but the destination address could not beobtained
Result
Related Commands DescriptionCommand
Enables blocking of incoming calls on the dial peer.call-block (dial peer)
Identifies the carrier handling the incoming call.carrier-id (dial-peer)
Specifies the ENUM search table for the targetsession.
session target (ENUM)
Displays the configuration of the dial peer.show dial-peer voice
Assigns a translation profile to the dial peer.translation-profile (dial-peer)
Cisco IOS Debug Command Reference - Commands A through D 603
debug decnet adj through debug dss ipx eventdebug dialpeer
DescriptionCommand
Assigns a trunk group to the dial peer.trunkgroup (dial-peer)
Identifies the trunk group handling the incoming call.trunk-group-label (dial-peer)
Cisco IOS Debug Command Reference - Commands A through D604
debug decnet adj through debug dss ipx eventdebug dialpeer
debug diameterTo display information about the Diameter Protocol, use the debugdiameter command in privileged EXECmode. To disable debugging output, use the no form of this command.
debug diameter [dcca| connection| error| packet| event| fsm| failover]
no debug diameter [dcca| connection| error| packet| event| fsm| failover]
Syntax Description (Optional) Enables debugging for Diameter-CreditControl Accounting.
dcca
(Optional) Enables debugging output for theconnection between two Diameter nodes.
connection
(Optional) Enables debugging output for Diametererrors.
error
(Optional) Enables debugging output for Diameterdata packets.
packet
(Optional) Enables debugging output for Diameterevents.
event
(Optional) Enables debugging output for the finitestate machine.
fsm
(Optional) Enables debugging output for Diameterredundancy.
failover
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.4(9)T
This command is supported in the Cisco IOS Release 12.2SX train. Support ina specific 12.2SX release of this train depends on your feature set, platform,and platform hardware.
12.2SX
Usage Guidelines Use this command to display information about any of the listed classes of information about the DiameterProtocol.
Cisco IOS Debug Command Reference - Commands A through D 605
debug decnet adj through debug dss ipx eventdebug diameter
Examples The following examples show output from the debugdiameter command:
ExamplesRouter# debug diameter all*May 9 17:58:14.832: Dia Base: Diameter Peer configured. Allocate connection context.*May 9 17:58:14.832: Dia Base: Allocate the peer connection context 50F63888, handleC000000C *May 9 17:58:14.832: Dia Base: (C000000C): Received peer configuration event *May9 17:58:14.832: Dia Peer FSM (50F63888): input event START in state CLOSED *May 9
17:58:14.832: Dia Peer FSM (50F63888): Starting Connection timer *May 9 17:58:14.832: DiaPeer FSM (50F63888): event START, stateCLOSED-->WAIT_CONN_ACK*May 9 17:58:14.836: Dia Transport: socket 0 - connecting to 9.113.33.6(3868)*May 9 17:58:14.836: Dia Transport: socket 0 - connection in progress *May 9 17:58:14.836:Dia Transport: socket 0 - local address 9.113.33.5(49214)*May 9 17:58:14.836: Dia Transport: socket 0 - resume socket write - nothing to write *May9 17:58:14.836: Dia Base: (C000000C): Received peer connection event from transport *May9 17:58:14.836: Dia Peer FSM (50F63888): input event RCV_CONN_ACK in state WAIT_CONN_ACK*May 9 17:58:14.836: Dia Base: Sending diameter message to peer "Unknown"*May 9 17:58:14.836: DIAMETER: CER message, ver=1, len=120, app=0, [2328318322/2328318322]
*May 9 17:58:14.836: DIAMETER: Origin-host-name [264]"host" (M)*May 9 17:58:14.836: DIAMETER: Origin-Realm [296]"cisco" (M)*May 9 17:58:14.836: DIAMETER: Host-IP-address [257]9.113.33.5 (M)*May 9 17:58:14.836: DIAMETER: Vendor-ID [266] 9(M)*May 9 17:58:14.836: DIAMETER: Product-name [269]"C7200-G8IS-M"*May 9 17:58:14.836: DIAMETER: Auth-Application-ID [258] 4(M)*May 9 17:58:14.836: DIAMETER: Firmware-Revision [267] 150D0B710: 01000078 80000101 00000000 ...x........50D0B720: 8AC75172 8AC75172 00000108 4000000C [email protected]: 686F7374 00000128 4000000D 63697363 host...(@...cisc50D0B740: 6F000000 00000101 4000000E 00010971 [email protected]: 21050000 0000010A 4000000C 00000009 [email protected]: 0000010D 00000014 43373230 302D4738 ........C7200-G850D0B770: 49532D4D 00000102 4000000C 00000004 [email protected]: 0000010B 0000000C 00000001 00 .............*May 9 17:58:14.836: Dia Base: Request message hash ctx created for [2328318322/2328318322]*May 9 17:58:14.836: Dia Peer FSM (50F63888): Starting CER timer *May 9 17:58:14.836:Dia Peer FSM (50F63888): event RCV_CONN_ACK, state WAIT_CONN_ACK-->WAIT_CEA *May 917:58:14.836: Dia Transport: Dia Transport write message event *May 9 17:58:14.836: DiaTransport: socket 0 - complete msg sent *May 9 17:58:14.840: Dia Transport: socket 0 -complete read of 20 bytes *May 9 17:58:14.840: Dia Transport: complete header read fromsocket 0 *May 9 17:58:14.840: Dia Transport: read msg (172) bytes from socket 0 *May 917:58:14.840: Dia Transport: socket 0 - complete read of 172 bytes *May 9 17:58:14.840:Dia Base: Diameter message received from the peer "Unknown"*May 9 17:58:14.840: DIAMETER: CEA message, ver=1, len=192, app=0, [2328318322/2328318322]
*May 9 17:58:14.840: DIAMETER: Result-code [268]2001 (M)*May 9 17:58:14.840: DIAMETER: Origin-host-name [264]"diameter2.cisco.com" (M)*May 9 17:58:14.840: DIAMETER: Origin-Realm [296]"cisco.com" (M)*May 9 17:58:14.840: DIAMETER: Host-IP-address [257]10.77.154.80 (M)*May 9 17:58:14.840: DIAMETER: Vendor-ID [266] 9(M)*May 9 17:58:14.840: DIAMETER: Product-name [269]"Diameter-Server"*May 9 17:58:14.840: DIAMETER: Supported-Vendor-ID [265]10415 (M)
Cisco IOS Debug Command Reference - Commands A through D606
debug decnet adj through debug dss ipx eventdebug diameter
*May 9 17:58:14.840: DIAMETER: Supported-Vendor-ID [265]12645 (M)*May 9 17:58:14.840: DIAMETER: Supported-Vendor-ID [265] 9(M)*May 9 17:58:14.840: DIAMETER: Supported-Vendor-ID [265] 9(M)*May 9 17:58:14.840: DIAMETER: Auth-Application-ID [258] 4(M)65940780: 010000C0 00000101 00000000 [email protected]: 8AC75172 8AC75172 0000010C 4000000C [email protected]: 000007D1 00000108 4000001B 6469616D [email protected]: 65746572 322E6369 73636F2E 636F6D00 eter2.cisco.com.659407C0: 00000128 40000011 63697363 6F2E636F ...(@...cisco.co659407D0: 6D000000 00000101 4000000E 00010A4D [email protected]: 9A500000 0000010A 4000000C 00000009 [email protected]: 0000010D 00000017 4469616D 65746572 ........Diameter65940800: 2D536572 76657200 00000109 4000000C [email protected]: 000028AF 00000109 4000000C 00003165 ..(/[email protected]: 00000109 4000000C 00000009 00000109 [email protected]: 4000000C 00000009 00000102 4000000C @[email protected]: 00000004 00 .....*May 9 17:58:14.840: Dia Base: Request message hash ctx removed for [2328318322/2328318322]*May 9 17:58:14.840: Dia Base: (C000000C): Received msg event from message i/o *May 917:58:14.840: Dia Peer FSM (50F63888): input event RCV_CEA in state WAIT_CEA *May 917:58:14.840: Dia Peer FSM (50F63888): Starting Watchdog timer *May 9 17:58:14.840:%DIABASE-4-DIA_PEER_UP: Diameter peer 9.113.33.6 port 3868 TCP UP *May 9 17:58:14.840: DiaPeer FSM (50F63888): event RCV_CEA, state WAIT_CEA-->OPEN
Examples*May 9 17:59:14.840: Dia Peer FSM (50F63888): input event TIMEOUT instate OPEN*May 9 17:59:14.840: Dia Base: Sending diameter message to peer"diameter2.cisco.com"*May 9 17:59:14.840: DIAMETER: DWR message, ver=1, len=48, app=0,[2328318323/2328318323]*May 9 17:59:14.840: DIAMETER: Origin-host-name [264]"host" (M)*May 9 17:59:14.840: DIAMETER: Origin-Realm [296]"cisco" (M)50D0B710: 01000030 80000118 00000000 ...0........50D0B720: 8AC75173 8AC75173 00000108 4000000C [email protected]: 686F7374 00000128 4000000D 63697363 host...(@...cisc50D0B740: 6F000000 FD o...}*May 9 17:59:14.840: Dia Base: Request message hash ctx created for[2328318323/2328318323]*May 9 17:59:14.840: Dia Peer FSM (50F63888): Starting Watchdog timer,[60] left for next timeout*May 9 17:59:14.840: Dia Peer FSM (50F63888):event TIMEOUT, state OPEN-->OPEN*May 9 17:59:14.840: Dia Transport: Dia Transport write message event*May 9 17:59:14.840: Dia Transport: socket 0 - complete msg sent*May 9 17:59:14.840: Dia Transport: socket 0 - complete read of 20bytes*May 9 17:59:14.840: Dia Transport: complete header read from socket 0*May 9 17:59:14.840: Dia Transport: read msg (60) bytes from socket 0*May 9 17:59:14.840: Dia Transport: socket 0 - complete read of 60bytes*May 9 17:59:14.840: Dia Base: Diameter message received from the peer"diameter2.cisco.com"*May 9 17:59:14.840: DIAMETER: DWA message, ver=1, len=80, app=0,[2328318323/2328318323]*May 9 17:59:14.840: DIAMETER: Result-code [268]2001 (M)*May 9 17:59:14.840: DIAMETER: Origin-host-name [264]"diameter2.cisco.com" (M)*May 9 17:59:14.840: DIAMETER: Origin-Realm [296]"cisco.com" (M)65940780: 01000050 00000118 00000000 ...P........65940790: 8AC75173 8AC75173 0000010C 4000000C [email protected]: 000007D1 00000108 4000001B 6469616D [email protected]: 65746572 322E6369 73636F2E 636F6D00 eter2.cisco.com.659407C0: 00000128 40000011 63697363 6F2E636F ...(@...cisco.co
Cisco IOS Debug Command Reference - Commands A through D 607
debug decnet adj through debug dss ipx eventdebug diameter
659407D0: 6D000000 00 m....*May 9 17:59:14.840: Dia Base: Request message hash ctx removed for[2328318323/2328318323]*May 9 17:59:14.840: Dia Base: (C000000C): Received msg event frommessage i/o*May 9 17:59:14.840: Dia Peer FSM (50F63888): input event RCV_DWA instate OPEN*May 9 17:59:14.840: Dia Peer FSM (50F63888): Starting Watchdog timer*May 9 17:59:14.840: Dia Peer FSM (50F63888): event RCV_DWA, stateOPEN-->OPEN
Examples*May 9 18:07:18.472: Dia Transport: socket 0 READ event: UP->CLOSE dueto bytes read = 0*May 9 18:07:18.472: Dia Base: (8600000E): Received peer disconnectionevent from transport*May 9 18:07:18.472: %DIABASE-4-DIA_PEER_DOWN: Diameter peer 9.113.33.6port 3868 TCP DOWN*May 9 18:07:18.472: Dia Peer FSM (2068FF44): input event PEER_DISC instate OPEN*May 9 18:07:18.472: Dia Peer FSM (2068FF44): Starting Reconnect timer*May 9 18:07:18.472: Dia Peer FSM (2068FF44): event PEER_DISC, stateOPEN-->CLOSED*May 9 18:07:48.472: Dia Peer FSM (2068FF44): input event START instate CLOSED*May 9 18:07:48.472: Dia Peer FSM (2068FF44): Starting Connection timer*May 9 18:07:48.472: Dia Peer FSM (2068FF44): event START, stateCLOSED-->WAIT_CONN_ACK*May 9 18:07:48.472: Dia Transport: socket 0 - connecting to 9.113.33.6(3868)*May 9 18:07:48.472: Dia Transport: socket 0 - connection in progress*May 9 18:07:48.472: Dia Transport: socket 0 - local address 9.113.33.5(61122)*May 9 18:07:48.472: Dia Transport: socket 0 - CONN_WAIT->CLOSE*May 9 18:07:48.472: Dia Base: (8600000E): Received peer disconnectionevent from transport*May 9 18:07:48.472: Dia Peer FSM (2068FF44): input event PEER_DISC instate WAIT_CONN_ACK*May 9 18:07:48.472: Dia Peer FSM (2068FF44): Starting Reconnect timer*May 9 18:07:48.472: Dia Peer FSM (2068FF44): event PEER_DISC, stateWAIT_CONN_ACK-->CLOSED
ExamplesGinger(config)#no diameter peer watchGinger(config)#*May 9 18:05:02.812: Dia Base: Peer unconfigured, start peerdisconnection*May 9 18:05:02.812: Dia Base: (C000000C): Received peerunconfiguration event*May 9 18:05:02.812: Dia Peer FSM (50F63888): input event STOP in stateOPEN*May 9 18:05:02.812: Dia Base: Sending diameter message to peer"diameter2.cisco.com"*May 9 18:05:02.812: DIAMETER: DPR message, ver=1, len=60, app=0,[2328318329/2328318329]*May 9 18:05:02.812: DIAMETER: Origin-host-name [264]"host" (M)*May 9 18:05:02.816: DIAMETER: Origin-Realm [296]"cisco" (M)*May 9 18:05:02.816: DIAMETER: Peer-disconnect-reason [273]Server-do-not-want-to-talk (M)653D1810: 0100003C 8000011A ...<....653D1820: 00000000 8AC75179 8AC75179 00000108 .....GQy.GQy....653D1830: 4000000C 686F7374 00000128 4000000D @...host...(@...653D1840: 63697363 6F000000 00000111 4000000C [email protected]: 00000002 00 .....*May 9 18:05:02.816: Dia Base: Request message hash ctx created for[2328318329/2328318329]*May 9 18:05:02.816: Dia Peer FSM (50F63888): Starting DPR timer
Cisco IOS Debug Command Reference - Commands A through D608
debug decnet adj through debug dss ipx eventdebug diameter
*May 9 18:05:02.816: Dia Peer FSM (50F63888): event STOP, stateOPEN-->CLOSING*May 9 18:05:02.816: Dia Transport: Dia Transport write message event*May 9 18:05:02.816: Dia Transport: socket 0 - complete msg sent*May 9 18:05:02.816: Dia Transport: socket 0 - complete read of 20bytes*May 9 18:05:02.816: Dia Transport: complete header read from socket 0*May 9 18:05:02.816: Dia Transport: read msg (60) bytes from socket 0*May 9 18:05:02.816: Dia Transport: socket 0 - complete read of 60bytes*May 9 18:05:02.816: Dia Base: Diameter message received from the peer"diameter2.cisco.com"*May 9 18:05:02.816: DIAMETER: DPA message, ver=1, len=80, app=0,[2328318329/2328318329]*May 9 18:05:02.816: DIAMETER: Result-code [268]2001 (M)*May 9 18:05:02.816: DIAMETER: Origin-host-name [264]"diameter2.cisco.com" (M)*May 9 18:05:02.816: DIAMETER: Origin-Realm [296]"cisco.com" (M)65913A20: 01000050 ...P65913A30: 0000011A 00000000 8AC75179 8AC75179 .........GQy.GQy65913A40: 0000010C 4000000C 000007D1 00000108 [email protected]: 4000001B 6469616D 65746572 322E6369 @...diameter2.ci65913A60: 73636F2E 636F6D00 00000128 40000011 sco.com....(@...65913A70: 63697363 6F2E636F 6D000000 00 cisco.com....*May 9 18:05:02.816: Dia Base: Request message hash ctx removed for[2328318329/2328318329]*May 9 18:05:02.816: Dia Base: (C000000C): Received msg event frommessage i/o*May 9 18:05:02.816: Dia Peer FSM (50F63888): input event RCV_DPA instate CLOSING*May 9 18:05:02.816: Dia Base: (C000000C): Free the peer connectioncontext 50F63888
Related Commands DescriptionCommand
Displays Diameter peer configuration information.show diameter peer
Cisco IOS Debug Command Reference - Commands A through D 609
debug decnet adj through debug dss ipx eventdebug diameter
debug dlswTo enable debugging of data-link switching plus (DLSw+), use the debugdlswcommand in privileged EXECmode. To disable debugging output, use the no form of this command.
debug dlsw border-peers [interface interface| ip address ip-address]core [flow-control messages| state|xid] [circuit-number]local-circuit circuit-numberpeers [interface interface [fast-errors| fast-paks]]ipaddress ip-address [fast-errors| fast-paks| fst-seq| udp]reachability [error| verbose] [sna| netbios]
no debug dlsw border-peers [interface interface| ip address ip-address]core [flow-control messages|state| xid] [circuit-number]local-circuit circuit-numberpeers [interface interface [fast-errors| fast-paks]]ipaddress ip-address [fast-errors| fast-paks| fst-seq| udp]reachability [error| verbose] [sna| netbios]
Syntax Description (Optional) Enables debugging output for border peerevents.
border-peers
(Optional) Specifies a remote peer to debug by adirect interface.
interface interface
(Optional) Specifies a remote peer to debug by its IPaddress.
ip address ip-address
(Optional) Enables debugging output for DLSw coreevents.
core
(Optional) Enables debugging output for congestionin the WAN or at the remote end station.
flow-control
(Optional) Enables debugging output of coremessages--specific packets received by DLSw eitherfrom one of its peers or from a local medium via theCisco link services interface.
messages
(Optional) Enables debugging output for state changeson the circuit.
state
(Optional) Enables debugging output for the exchangeidentification state machine.
xid
(Optional) Specifies the circuit for which you wantcore debugging output to reduce the output.
circuit-numbe r
(Optional) Enables debugging output for circuitsperforming local conversion. Local conversion occurswhen both the input and output data-link connectionsare on the same local peer and no remote peer exists.
local-circuit circuit-number
(Optional) Enables debugging output for peer events.peers
Cisco IOS Debug Command Reference - Commands A through D610
debug decnet adj through debug dss ipx eventdebug dlsw
(Optional) Debugs errors for fast-switched packets.fast-errors
(Optional) Debugs fast-switched packets.fast-paks
(Optional) Debugs Fast-Sequenced Transport (FST)sequence numbers on fast switched packets.
fst-seq
(Optional) Debugs User Datagram Protocol (UDP)packets.
udp
(Optional) Enables debugging output for reachabilityevents (explorer traffic). If no options are specified,event-level information is displayed for all protocols.
reachability
(Optional) Specifies how much reachabilityinformation you want displayed. The verbosekeyword displays everything, including errors andevents. The error keyword displays error informationonly. If no option is specified, event-level informationis displayed.
error |verbose
(Optional) Specifies that reachability information bedisplayed for only Systems Network Architecture(SNA) or Network Basic Input/Output System(NetBIOS) protocols. If no option is specified,information for all protocols is displayed.
sna | netbios
Usage Guidelines When you specify no optional keywords, the debug dlsw command enables all available DLSW debuggingoutput.
Normally you need to use only the error or verboseoption of thedebugdlswreachabilitycommand to helpidentify problems. The error option is recommended for use by customers and provides a subset of themessages from the normal event-level debugging. The verbose option provides a very detailed view of events,and is typically used only by service personnel.
To reduce the amount of debug information displayed, use the sna or netbios option with thedebugdlswreachabilitycommand if you know that you have an SNA or NetBIOS problem.
The DLSw core is the engine that is responsible for the establishment and maintenance of remote circuits. Ifpossible, specifying the index of the specific circuit you want to debug reduces the amount of output displayed.However, if you want to watch a circuit initially come up, do not use the circuit-number option with the corekeyword.
The coreflow-control option provides information about congestion in the WAN or at the remote end station.In these cases, DLSw sends Receiver Not Ready (RNR) frames on its local circuits, slowing data traffic onestablished sessions and giving the congestion an opportunity to clear.
The corestateoption allows you to see when the circuit changes state. This capability is especially useful fordetermining why a session cannot be established or why a session is being disconnected.
The coreXIDoption allows you to track the exchange identification (XID)-state machine. The router tracksXID commands and responses used in negotiations between end stations before establishing a session.
Cisco IOS Debug Command Reference - Commands A through D 611
debug decnet adj through debug dss ipx eventdebug dlsw
Examples The following examples show and explain some of the typical DLSw debugging messages you might seewhen using thedebugdlswcommand.
The following example enables UDP packet debugging for a specific remote peer:
Router# debug dlsw peers ip-address 1.1.1.6 udpThe following message is sample output from the debugdlswborder-peerscommand:
*Mar 10 17:39:56: CSM: delete group mac cache for group 0*Mar 10 17:39:56: CSM: delete group name cache for group 0*Mar 10 17:40:19: CSM: update group cache for mac 0000.3072.1070, group 10*Mar 10 17:40:22: DLSw: send_to_group_members(): copy to peer 10.19.32.5The following message is from a router that initiated a TCP connection:
DLSw: START-TPFSM (peer 10.3.8.7(2065)): event:ADMIN-OPEN CONNECTION state:DISCONNDLSw: dtp_action_a() attempting to connect peer 10.3.8.7(2065)DLSw: END-TPFSM (peer 10.3.8.7(2065)): state:DISCONN->WAIT_WRDLSw: Async Open Callback 10.3.8.7(2065) -> 11002DLSw: START-TPFSM (peer 10.3.8.7(2065)): event:TCP-WR PIPE OPENED state:WAIT_WRDLSw: dtp_action_f() start read open timer for peer 10.3.8.7(2065)DLSw: END-TPFSM (peer 10.3.8.7(2065)): state:WAIT_WR->WAIT_RDDLSw: passive open 10.3.8.7(11004) -> 2065DLSw: START-TPFSM (peer 10.3.8.7(2065)): event:TCP-RD PIPE OPENED state:WAIT_RDDLSw: dtp_action_g() read pipe opened for peer 10.3.8.7(2065)DLSw: CapExId Msg sent to peer 10.3.8.7(2065)DLSw: END-TPFSM (peer 10.3.8.7(2065)): state:WAIT_RD->WAIT_CAPDLSw: START-TPFSM (peer 10.3.8.7(2065)): event:SSP-CAP MSG RCVD state:WAIT_CAPDLSw: dtp_action_j() cap msg rcvd from peer 10.3.8.7(2065)DLSw: Recv CapExId Msg from peer 10.3.8.7(2065)DLSw: Pos CapExResp sent to peer 10.3.8.7(2065)DLSw: END-TPFSM (peer 10.3.8.7(2065)): state:WAIT_CAP->WAIT_CAPDLSw: START-TPFSM (peer 10.3.8.7(2065)): event:SSP-CAP MSG RCVD state:WAIT_CAPDLSw: dtp_action_j() cap msg rcvd from peer 10.3.8.7(2065)DLSw: Recv CapExPosRsp Msg from peer 10.3.8.7(2065)DLSw: END-TPFSM (peer 10.3.8.7(2065)): state:WAIT_CAP->WAIT_CAPDLSw: Processing delayed event:SSP-CAP EXCHANGED - prev state:WAIT_CAPDLSw: START-TPFSM (peer 10.3.8.7(2065)): event:SSP-CAP EXCHANGED state:WAIT_CAPDLSw: dtp_action_k() cap xchged for peer 10.3.8.7(2065)DLSw: closing read pipe tcp connection for peer 10.3.8.7(2065)DLSw: END-TPFSM (peer 10.3.8.7(2065)): state:WAIT_CAP->PCONN_WTDLSw: Processing delayed event:TCP-PEER CONNECTED - prev state:PCONN_WTDLSw: START-TPFSM (peer 10.3.8.7(2065)): event:TCP-PEER CONNECTED state:PCONN_WTDLSw: dtp_action_m() peer connected for peer 10.3.8.7(2065)DLSw: END-TPFSM (peer 10.3.8.7(2065)): state:PCONN_WT->CONNECTDLSw: START-TPFSM (peer 10.3.8.7(2065)): event:CORE-ADD CIRCUIT state:CONNECTDLSw: dtp_action_u(), peer add circuit for peer 10.3.8.7(2065)DLSw: END-TPFSM (peer 10.3.8.7(2065)): state:CONNECT->CONNECTThe following message is from a router that received a TCP connection:
DLSw: passive open 10.10.10.4(11002) -> 2065DLSw: START-TPFSM (peer 10.10.10.4(2065)): event:TCP-RD PIPE OPENED state:DISCONNDLSw: dtp_action_c() opening write pipe for peer 10.10.10.4(2065)DLSw: END-TPFSM (peer 10.10.10.4(2065)): state:DISCONN->WWR_RDOPDLSw: Async Open Callback 10.10.10.4(2065) -> 11004DLSw: START-TPFSM (peer 10.10.10.4(2065)): event:TCP-WR PIPE OPENED state:WWR_RDOPDLSw: dtp_action_i() write pipe opened for peer 10.10.10.4(2065)DLSw: CapExId Msg sent to peer 10.10.10.4(2065)DLSw: END-TPFSM (peer 10.10.10.4(2065)): state:WWR_RDOP->WAIT_CAPDLSw: START-TPFSM (peer 10.10.10.4(2065)): event:SSP-CAP MSG RCVD state:WAIT_CAPDLSw: dtp_action_j() cap msg rcvd from peer 10.10.10.4(2065)DLSw: Recv CapExId Msg from peer 10.10.10.4(2065)DLSw: Pos CapExResp sent to peer 10.10.10.4(2065)DLSw: END-TPFSM (peer 10.10.10.4(2065)): state:WAIT_CAP->WAIT_CAPDLSw: START-TPFSM (peer 10.10.10.4(2065)): event:SSP-CAP MSG RCVD state:WAIT_CAPDLSw: dtp_action_j() cap msg rcvd from peer 10.10.10.4(2065)DLSw: Recv CapExPosRsp Msg from peer 10.10.10.4(2065)
Cisco IOS Debug Command Reference - Commands A through D612
debug decnet adj through debug dss ipx eventdebug dlsw
DLSw: END-TPFSM (peer 10.10.10.4(2065)): state:WAIT_CAP->WAIT_CAPDLSw: Processing delayed event:SSP-CAP EXCHANGED - prev state:WAIT_CAPDLSw: START-TPFSM (peer 10.10.10.4(2065)): event:SSP-CAP EXCHANGED state:WAIT_CAPDLSw: dtp_action_k() cap xchged for peer 10.10.10.4(2065)DLSw: END-TPFSM (peer 10.10.10.4(2065)): state:WAIT_CAP->PCONN_WTDLSw: dlsw_tcpd_fini() for peer 10.10.10.4(2065)DLSw: dlsw_tcpd_fini() closing write pipe for peer 10.10.10.4DLSw: START-TPFSM (peer 10.10.10.4(2065)): event:TCP-CLOSE WR PIPE state:PCONN_WTDLSw: dtp_action_l() close write pipe for peer 10.10.10.4(2065)DLSw: closing write pipe tcp connection for peer 10.10.10.4(2065)DLSw: END-TPFSM (peer 10.10.10.4(2065)): state:PCONN_WT->PCONN_WTDLSw: Processing delayed event:TCP-PEER CONNECTED - prev state:PCONN_WTDLSw: START-TPFSM (peer 10.10.10.4(2065)): event:TCP-PEER CONNECTED state:PCONN_WTDLSw: dtp_action_m() peer connected for peer 10.10.10.4(2065)DLSw: END-TPFSM (peer 10.10.10.4(2065)): state:PCONN_WT->CONNECTDLSw: START-TPFSM (peer 10.10.10.4(2065)): event:CORE-ADD CIRCUIT state:CONNECTDLSw: dtp_action_u(), peer add circuit for peer 10.10.10.4(2065)DLSw: END-TPFSM (peer 10.10.10.4(2065)): state:CONNECT->CONNECTThe following message is from a router that initiated an FST connection:
DLSw: START-FSTPFSM (peer 10.10.10.4(0)): event:ADMIN-OPEN CONNECTION state:DISCONNDLSw: dfstp_action_a() attempting to connect peer 10.10.10.4(0)DLSw: Connection opened for peer 10.10.10.4(0)DLSw: CapExId Msg sent to peer 10.10.10.4(0)DLSw: END-FSTPFSM (peer 10.10.10.4(0)): state:DISCONN->WAIT_CAPDLSw: START-FSTPFSM (peer 10.10.10.4(0)): event:SSP-CAP MSG RCVD state:WAIT_CAPDLSw: dfstp_action_e() cap msg rcvd for peer 10.10.10.4(0)DLSw: Recv CapExPosRsp Msg from peer 10.10.10.4(0)DLSw: END-FSTPFSM (peer 10.10.10.4(0)): state:WAIT_CAP->WAIT_CAPDLSw: START-FSTPFSM (peer 10.10.10.4(0)): event:SSP-CAP MSG RCVD state:WAIT_CAPDLSw: dfstp_action_e() cap msg rcvd for peer 10.10.10.4(0)DLSw: Recv CapExId Msg from peer 10.10.10.4(0)DLSw: Pos CapExResp sent to peer 10.10.10.4(0)DLSw: END-FSTPFSM (peer 10.10.10.4(0)): state:WAIT_CAP->WAIT_CAPDLSw: Processing delayed event:SSP-CAP EXCHANGED - prev state:WAIT_CAPDLSw: START-FSTPFSM (peer 10.10.10.4(0)): event:SSP-CAP EXCHANGED state:WAIT_CAPDLSw: dfstp_action_f() cap xchged for peer 10.10.10.4(0)DLSw: END-FSTPFSM (peer 10.10.10.4(0)): state:WAIT_CAP->CONNECTThe following message is from a router that received an FST connection:
DLSw: START-FSTPFSM (peer 10.3.8.7(0)): event:SSP-CAP MSG RCVD state:DISCONNDLSw: dfstp_action_c() cap msg rcvd for peer 10.3.8.7(0)DLSw: Recv CapExId Msg from peer 10.3.8.7(0)DLSw: Pos CapExResp sent to peer 10.3.8.7(0)DLSw: CapExId Msg sent to peer 10.3.8.7(0)DLSw: END-FSTPFSM (peer 10.3.8.7(0)): state:DISCONN->WAIT_CAPDLSw: START-FSTPFSM (peer 10.3.8.7(0)): event:SSP-CAP MSG RCVD state:WAIT_CAPDLSw: dfstp_action_e() cap msg rcvd for peer 10.3.8.7(0)DLSw: Recv CapExPosRsp Msg from peer 10.3.8.7(0)DLSw: END-FSTPFSM (peer 10.3.8.7(0)): state:WAIT_CAP->WAIT_CAPDLSw: Processing delayed event:SSP-CAP EXCHANGED - prev state:WAIT_CAPDLSw: START-FSTPFSM (peer 10.3.8.7(0)): event:SSP-CAP EXCHANGED state:WAIT_CAPDLSw: dfstp_action_f() cap xchged for peer 10.3.8.7(0)DLSw: END-FSTPFSM (peer 10.3.8.7(0)): state:WAIT_CAP->CONNECTThe following message is from a router that initiated an LLC2 connection:
DLSw-LLC2: Sending enable port ; port no : 0PEER-DISP Sent : CLSI Msg : ENABLE.Req dlen: 20
DLSw: Peer Received : CLSI Msg : ENABLE.Cfm CLS_OK dlen: 20DLSw-LLC2 : Sending activate sap for Serial1 - port_id = 887C3C
port_type = 7 dgra(UsapID) = 952458PEER-DISP Sent : CLSI Msg : ACTIVATE_SAP.Req dlen: 60
DLSw: Peer Received : CLSI Msg : ACTIVATE_SAP.Cfm CLS_OK dlen: 60DLSw Got ActSapcnf back for Serial1 - port_id = 8978204, port_type = 7, psap_id = 0DLSw: START-LLC2PFSM (peer on interface Serial1): event:ADMIN-OPEN CONNECTION state:DISCONNDLSw: dllc2p_action_a() attempting to connect peer on interface Serial1PEER-DISP Sent : CLSI Msg : REQ_OPNSTN.Req dlen: 106DLSw: END-LLC2PFSM (peer on interface Serial1): state:DISCONN->ROS_SENTDLSw: Peer Received : CLSI Msg : REQ_OPNSTN.Cfm CLS_OK dlen: 106DLSw: START-LLC2PFSM (peer on interface Serial1): event:CLS-REQOPNSTN.CNF state:ROS_SENT
Cisco IOS Debug Command Reference - Commands A through D 613
debug decnet adj through debug dss ipx eventdebug dlsw
DLSw: dllc2p_action_c()PEER-DISP Sent : CLSI Msg : CONNECT.Req dlen: 16DLSw: END-LLC2PFSM (peer on interface Serial1): state:ROS_SENT->CON_PENDDLSw: Peer Received : CLSI Msg : CONNECT.Cfm CLS_OK dlen: 28DLSw: START-LLC2PFSM (peer on interface Serial1): event:CLS-CONNECT.CNF state:CON_PENDDLSw: dllc2p_action_e() send capabilities to peer on interface Serial1PEER-DISP Sent : CLSI Msg : SIGNAL_STN.Req dlen: 8PEER-DISP Sent : CLSI Msg : DATA.Req dlen: 418DLSw: CapExId Msg sent to peer on interface Serial1DLSw: END-LLC2PFSM (peer on interface Serial1): state:CON_PEND->WAIT_CAPDLSw: Peer Received : CLSI Msg : DATA.Ind dlen: 418DLSw: START-LLC2PFSM (peer on interface Serial1): event:SSP-CAP MSG RCVD state:WAIT_CAPDLSw: dllc2p_action_k() cap msg rcvd for peer on interface Serial1DLSw: Recv CapExId Msg from peer on interface Serial1PEER-DISP Sent : CLSI Msg : DATA.Req dlen: 96DLSw: Pos CapExResp sent to peer on interface Serial1DLSw: END-LLC2PFSM (peer on interface Serial1): state:WAIT_CAP->WAIT_CAPDLSw: Peer Received : CLSI Msg : DATA.Ind dlen: 96DLSw: START-LLC2PFSM (peer on interface Serial1): event:SSP-CAP MSG RCVD state:WAIT_CAPDLSw: dllc2p_action_k() cap msg rcvd for peer on interface Serial1DLSw: Recv CapExPosRsp Msg from peer on interface Serial1DLSw: END-LLC2PFSM (peer on interface Serial1): state:WAIT_CAP->WAIT_CAPDLSw: Processing delayed event:SSP-CAP EXCHANGED - prev state:WAIT_CAPDLSw: START-LLC2PFSM (peer on interface Serial1): event:SSP-CAP EXCHANGED state:WAIT_CAPDLSw: dllc2p_action_l() cap xchged for peer on interface Serial1DLSw: END-LLC2PFSM (peer on interface Serial1): state:WAIT_CAP->CONNECTThe following message is from a router that received a Logical Link Control, type 2 (LLC2) connection:
DLSw-LLC2: Sending enable port ; port no : 0PEER-DISP Sent : CLSI Msg : ENABLE.Req dlen: 20DLSw: Peer Received : CLSI Msg : ENABLE.Cfm CLS_OK dlen: 20DLSw-LLC2 : Sending activate sap for Serial0 - port_id = 887C3Cport_type = 7 dgra(UsapID) = 93AB34PEER-DISP Sent : CLSI Msg : ACTIVATE_SAP.Req dlen: 60DLSw: Peer Received : CLSI Msg : ACTIVATE_SAP.Cfm CLS_OK dlen: 60DLSw Got ActSapcnf back for Serial0 - port_id = 8944700, port_type = 7, psap_id = 0DLSw: Peer Received : CLSI Msg : CONECT_STN.Ind dlen: 39DLSw: START-LLC2PFSM (peer on interface Serial0): event:CLS-CONNECT_STN.IND state:DISCONNDLSw: dllc2p_action_s() conn_stn for peer on interface Serial0PEER-DISP Sent : CLSI Msg : REQ_OPNSTN.Req dlen: 106DLSw: END-LLC2PFSM (peer on interface Serial0): state:DISCONN->CONS_PENDDLSw: Peer Received : CLSI Msg : REQ_OPNSTN.Cfm CLS_OK dlen: 106DLSw: START-LLC2PFSM (peer on interface Serial0): event:CLS-REQOPNSTN.CNF state:CONS_PENDDLSw: dllc2p_action_h() send capabilities to peer on interface Serial0PEER-DISP Sent : CLSI Msg : CONNECT.Rsp dlen: 20PEER-DISP Sent : CLSI Msg : DATA.Req dlen: 418DLSw: CapExId Msg sent to peer on interface Serial0DLSw: END-LLC2PFSM (peer on interface Serial0): state:CONS_PEND->WAIT_CAPDLSw: Peer Received : CLSI Msg : CONNECTED.Ind dlen: 8DLSw: START-LLC2PFSM (peer on interface Serial0): event:CLS-CONNECTED.IND state:WAIT_CAPDLSw: END-LLC2PFSM (peer on interface Serial0): state:WAIT_CAP->WAIT_CAPDLSw: Peer Received : CLSI Msg : DATA.Ind dlen: 418DLSw: START-LLC2PFSM (peer on interface Serial0): event:SSP-CAP MSG RCVD state:WAIT_CAPDLSw: dllc2p_action_k() cap msg rcvd for peer on interface Serial0DLSw: Recv CapExId Msg from peer on interface Serial0PEER-DISP Sent : CLSI Msg : DATA.Req dlen: 96DLSw: Pos CapExResp sent to peer on interface Serial0DLSw: END-LLC2PFSM (peer on interface Serial0): state:WAIT_CAP->WAIT_CAPDLSw: Peer Received : CLSI Msg : DATA.Ind dlen: 96DLSw: START-LLC2PFSM (peer on interface Serial0): event:SSP-CAP MSG RCVD state:WAIT_CAPDLSw: dllc2p_action_k() cap msg rcvd for peer on interface Serial0DLSw: Recv CapExPosRsp Msg from peer on interface Serial0DLSw: END-LLC2PFSM (peer on interface Serial0): state:WAIT_CAP->WAIT_CAPDLSw: Processing delayed event:SSP-CAP EXCHANGED - prev state:WAIT_CAPDLSw: START-LLC2PFSM (peer on interface Serial0): event:SSP-CAP EXCHANGED state:WAIT_CAPDLSw: dllc2p_action_l() cap xchged for peer on interface Serial0DLSw: END-LLC2PFSM (peer on interface Serial0): state:WAIT_CAP->CONNECT
Cisco IOS Debug Command Reference - Commands A through D614
debug decnet adj through debug dss ipx eventdebug dlsw
The following messages occur when a CUR_ex (CANUREACH explorer) frame is received from other peers,and the peer statements or the promiscuous keyword have not been enabled so that the router is not configuredcorrectly:
22:42:44: DLSw: Not promiscuous - Rej conn from 172.20.96.1(2065)22:42:51: DLSw: Not promiscuous - Rej conn from 172.20.99.1(2065)In the following messages, the router sends a keepalive message every 30 seconds to keep the peer connected.If three keepalive messages are missed, the peer is torn down. These messages are displayed only if keepalivesare enabled (by default, keepalives are disabled):
22:44:03: DLSw: Keepalive Request sent to peer 172.20.98.1(2065) (168243148)22:44:03: DLSw: Keepalive Response from peer 172.20.98.1(2065) (168243176)22:44:34: DLSw: Keepalive Request sent to peer 172.20.98.1(2065) (168274148)22:44:34: DLSw: Keepalive Response from peer 172.20.98.1(2065) (168274172)The following peer debuggingmessages indicate that the local peer is disconnecting from the specified remotepeer because of missed peer keepalives:
0:03:24: DLSw: keepalive failure for peer on interface Serial00:03:24: DLSw: action_d(): for peer on interface Serial00:03:24: DLSW: DIRECT aborting connection for peer on interface Serial00:03:24: DLSw: peer on interface Serial0, old state CONNECT, new state DISCONNThe following peer debugging messages result from an attempt to connect to an IP address that does not haveDLSw enabled. The local router attempts to connect in 30-second intervals:
23:13:22: action_a() attempting to connect peer 172.20.100.1(2065)23:13:22: DLSw: CONN: peer 172.20.100.1 open failed, rejected [9]23:13:22: action_a() retries: 8 next conn time: 86123250423:13:52: action_a() attempting to connect peer 172.20.100.1(2065)23:13:52: DLSw: CONN: peer 172.20.100.1 open failed, rejected [9]23:13:52: action_a() retries: 9 next conn time: 861292536The following peer debuggingmessages that indicates a remote peer statement is missing on the router (address172.20.100.1) to which the connection attempt is sent:
23:14:52: action_a() attempting to connect peer 172.20.100.1(2065)23:14:52: DLSw: action_a(): Write pipe opened for peer 172.20.100.1(2065)23:14:52: DLSw: peer 172.20.100.1(2065), old state DISCONN, new state WAIT_RD23:14:52: DLSw: dlsw_tcpd_fini() closing connection for peer 172.20.100.123:14:52: DLSw: action_d(): for peer 172.20.100.1(2065)23:14:52: DLSw: aborting tcp connection for peer 172.20.100.1(2065)23:14:52: DLSw: peer 172.20.100.1(2065), old state WAIT_RD, new state DISCONNThe following messages show a peer connection opening with no errors or abnormal events:
23:16:37: action_a() attempting to connect peer 172.20.100.1(2065)23:16:37: DLSw: action_a(): Write pipe opened for peer 172.20.100.1(2065)23:16:37: DLSw: peer 172.20.100.1(2065), old state DISCONN, new state WAIT_RD23:16:37: DLSW: passive open 172.20.100.1(17762) -> 206523:16:37: DLSw: action_c(): for peer 172.20.100.1(2065)23:16:37: DLSw: peer 172.20.100.1(2065), old state WAIT_RD, new state CAP_EXG23:16:37: DLSw: peer 172.20.100.1(2065) conn_start_time set to 86139778423:16:37: DLSw: CapExId Msg sent to peer 172.20.100.1(2065)23:16:37: DLSw: Recv CapExId Msg from peer 172.20.100.1(2065)23:16:37: DLSw: Pos CapExResp sent to peer 172.20.100.1(2065)23:16:37: DLSw: action_e(): for peer 172.20.100.1(2065)23:16:37: DLSw: Recv CapExPosRsp Msg from peer 172.20.100.1(2065)23:16:37: DLSw: action_e(): for peer 172.20.100.1(2065)23:16:37: DLSw: peer 172.20.100.1(2065), old state CAP_EXG, new state CONNECT23:16:37: DLSw: dlsw_tcpd_fini() closing write pipe for peer 172.20.100.123:16:37: DLSw: action_g(): for peer 172.20.100.1(2065)23:16:37: DLSw: closing write pipe tcp connection for peer 172.20.100.1(2065)23:16:38: DLSw: peer_act_on_capabilities() for peer 172.20.100.1(2065)
Cisco IOS Debug Command Reference - Commands A through D 615
debug decnet adj through debug dss ipx eventdebug dlsw
The following two messages show that an information frame is passing through the router:
DLSw: dlsw_tr2fct() lmac:c000.a400.0000 rmac:0800.5a29.75fe ls:5 rs:4 i:34DLSw: dlsw_tr2fct() lmac:c000.a400.0000 rmac:0800.5a29.75fe ls:4 rs:4 i:34
Examples The messages in this section are based on the following criteria:
• Reachability is stored in cache. DLSw+ maintains two reachability caches: one for MAC addresses andone for NetBIOS names. Depending on how long entries have been in the cache, they are either freshor stale.
• If a router has a fresh entry in the cache for a certain resource, it answers a locate request for that resourcewithout verifying that it is still available. A locate request is typically a TEST frame for MAC addressesor a FIND_NAME_QUERY for NetBIOS.
• If a router has a stale entry in the cache for a certain resource, it verifies that the entry is still valid beforeanswering a locate request for the resource by sending a frame to the last known location of the resourceand waits for a resource. If the entry is a REMOTE entry, the router sends a CUR_ex frame to the remotepeer to verify. If the entry is a LOCAL entry, it sends either a TEST frame or a NetBIOSFIND_NAME_QUERY on the appropriate local port.
• By default, all reachability cache entries remain fresh for 4 minutes after they are learned. For MACaddresses, you can change this time with the dlswtimersna-verify-interval command. For NetBIOSnames, you can change this time with the dlswtimernetbios-verify-interval command.
• By default, all reachability cache entries age out of the cache 16minutes after they are learned. ForMACaddresses, you can change this time with the dlswtimersna-cache-timeout command. For NetBIOSnames, you can change the time with the dlswtimernetbios-cache-timeout command.
The table below describes the debug output indicating that the DLSW router received an SSP message thatis flow controlled and should be counted against the window of the sender.
Dec 6 11:26:49: CSM: Received SSP CUR csex flags = 80, mac 4000.90b1.26cf,The csex flags = 80 means that this is an CUR_ex (explorer).Dec 5 10:48:33: DLSw: 1620175180 decr r - s:27 so:0 r:27 ro:0
Table 76: debug dlsw Field Descriptions
DescriptionField
Decrement received count.decr r
This DLSW router’s granted units for the circuit.s
0=This DLSW router does not owe a flow controlacknowledgment.
1=This router owes a flow control acknowledgment.
so
Partner’s number of granted units for the circuit.r
Indicates whether the partner owes flow controlacknowledgment.
ro
Cisco IOS Debug Command Reference - Commands A through D616
debug decnet adj through debug dss ipx eventdebug dlsw
The following message shows that DLSW is sending an I frame to a LAN:
Dec 5 10:48:33: DISP Sent : CLSI Msg : DATA.Req dlen: 1086The following message shows that DLSW received the I frame from the LAN:
Dec 5 10:48:35: DLSW Received-disp : CLSI Msg : DATA.Ind dlen: 4The following messages show that the reachability cache is cleared:
Router# clear dlsw rea23:44:11: CSM: Clearing CSM cache23:44:11: CSM: delete local mac cache for port 023:44:11: CSM: delete local name cache for port 023:44:11: CSM: delete remote mac cache for peer 023:44:11: CSM: delete remote name cash dlsw reaThe next group of messages show that the DLSW reachability cache is added, and that a name query is performfrom the router MARIAN:
23:45:11: CSM: core_to_csm CLSI_MSG_PROC - port_id 5EFBB423:45:11: CSM: 0800.5a30.7a9b passes local mac excl. filter23:45:11: CSM: update local cache for mac 0800.5a30.7a9b, port 5EFBB423:45:11: CSM: update local cache for name MARIAN , port 5EFBB423:45:11: CSM: Received CLS_UDATA_STN from Core23:45:11: CSM: Received netbios frame type A23:45:11: CSM: Processing Name Query23:45:11: CSM: Netbios Name Query: ws_status = 623:45:11: CSM: Write to peer 0 ok.23:45:11: CSM: Freeing clsi message23:45:11: CSM: core_to_csm CLSI_MSG_PROC - port_id 658AB423:45:11: CSM: 0800.5a30.7a9b passes local mac excl. filter23:45:11: CSM: update local cache for mac 0800.5a30.7a9b, port 658AB423:45:11: CSM: update local cache for name MARIAN , port 658AB423:45:11: CSM: Received CLS_UDATA_STN from Core23:45:11: CSM: Received netbios frame type A23:45:11: CSM: Processing Name Query23:45:11: CSM: Netbios Name Query: ws_status = 523:45:11: CSM: DLXNR_PEND match found.... drop name query23:45:11: CSM: Freeing clsi message23:45:12: CSM: core_to_csm CLSI_MSG_PROC - port_id 5EFBB423:45:12: CSM: 0800.5a30.7a9b passes local mac excl. filter23:45:12: CSM: update local cache for mac 0800.5a30.7a9b, port 5EFBB423:45:12: CSM: update local cache for name MARIAN , port 5EFBB423:45:12: CSM: Received CLS_UDATA_STN from Core23:45:12: CSM: Received netbios frame type A23:45:12: CSM: Processing Name Query23:45:12: CSM: Netbios Name Query: ws_status = 523:45:12: CSM: DLXNR_PEND match found.... drop name query23:45:12: CSM: Freeing clsi message23:45:12: CSM: core_to_csm CLSI_MSG_PROC - port_id 658AB423:45:12: CSM: 0800.5a30.7a9b passes local mac excl. filter23:45:12: CSM: update local cache for mac 0800.5a30.7a9b, port 658AB423:45:12: CSM: update local cache for name MARIAN , port 658AB423:45:12: CSM: Received CLS_UDATA_STN from Core23:45:12: CSM: Received netbios frame type A23:45:12: CSM: Processing Name Query23:45:12: CSM: Netbios Name Query: ws_status = 523:45:12: CSM: DLXNR_PEND match found.... drop name query23:45:12: CSM: Freeing clsi message23:45:12: CSM: core_to_csm CLSI_MSG_PROC - port_id 5EFBB423:45:12: CSM: 0800.5a30.7a9b passes local mac excl. filter23:45:12: CSM: update local cache for mac 0800.5a30.7a9b, port 5EFBB423:45:12: CSM: update local cache for name MARIAN , port 5EFBB423:45:12: CSM: Received CLS_UDATA_STN from Core23:45:12: CSM: Received netbios frame type A23:45:12: CSM: Processing Name Query23:45:12: CSM: Netbios Name Query: ws_status = 523:45:12: CSM: DLXNR_PEND match found.... drop name query23:45:12: CSM: Freeing clsi message23:45:12: CSM: core_to_csm CLSI_MSG_PROC - port_id 658AB4
Cisco IOS Debug Command Reference - Commands A through D 617
debug decnet adj through debug dss ipx eventdebug dlsw
23:45:12: CSM: 0800.5a30.7a9b passes local mac excl. filter23:45:12: CSM: update local cache for mac 0800.5a30.7a9b, port 658AB423:45:12: CSM: update local cache for name MARIAN , port 658AB423:45:12: CSM: Received CLS_UDATA_STN from Core23:45:12: CSM: Received netbios frame type A23:45:12: CSM: Processing Name Query23:45:12: CSM: Netbios Name Query: ws_status = 523:45:12: CSM: DLXNR_PEND match found.... drop name query23:45:12: CSM: Freeing clsi message23:45:18: CSM: Deleting Reachability cache23:45:18: CSM: Deleting DLX NR pending record....23:45:38: CSM: core_to_csm CLSI_MSG_PROC - port_id 5EFBB423:45:38: CSM: 0800.5a30.7a9b passes local mac excl. filter23:45:38: CSM: update local cache for mac 0800.5a30.7a9b, port 5EFBB423:45:38: CSM: update local cache for name MARIAN , port 5EFBB423:45:38: CSM: Received CLS_UDATA_STN from Core23:45:38: CSM: Received netbios frame type 823:45:38: CSM: Write to peer 0 ok.23:45:38: CSM: Freeing clsi message23:45:38: CSM: core_to_csm CLSI_MSG_PROC - port_id 658AB423:45:38: CSM: 0800.5a30.7a9b passes local mac excl. filter23:45:38: CSM: update local cache for mac 0800.5a30.7a9b, port 658AB423:45:38: CSM: update local cache for name MARIAN , port 658AB423:45:38: CSM: Received CLS_UDATA_STN from Core23:45:38: CSM: Received netbios frame type 823:45:38: CSM: Write to peer 0 ok.23:45:38: CSM: Freeing clsi messageThe following messages show that the router named MARIAN is added to the network:
23:45:38: CSM: core_to_csm CLSI_MSG_PROC - port_id 5EFBB423:45:38: CSM: 0800.5a30.7a9b passes local mac excl. filter23:45:38: CSM: update local cache for mac 0800.5a30.7a9b, port 5EFBB423:45:38: CSM: update local cache for name MARIAN , port 5EFBB423:45:38: CSM: Received CLS_UDATA_STN from Core23:45:38: CSM: Received netbios frame type 823:45:38: CSM: Write to peer 0 ok.23:45:38: CSM: Freeing clsi message23:45:38: CSM: core_to_csm CLSI_MSG_PROC - port_id 658AB423:45:38: CSM: 0800.5a30.7a9b passes local mac excl. filter23:45:38: CSM: update local cache for mac 0800.5a30.7a9b, port 658AB423:45:38: CSM: update local cache for name MARIAN , port 658AB423:45:38: CSM: Received CLS_UDATA_STN from Core23:45:38: CSM: Received netbios frame type 823:45:38: CSM: Write to peer 0 ok.23:45:38: CSM: Freeing clsi messageIn the next group of messages, an attempt is made to add the router named GINGER on the Ethernet interface:
0:07:44: CSM: core_to_csm CLSI_MSG_PROC - port_id 658AB40:07:44: CSM: 0004.f545.24e6 passes local mac excl. filter0:07:44: CSM: update local cache for mac 0004.f545.24e6, port 658AB40:07:44: CSM: update local cache for name GINGER , port 658AB40:07:44: CSM: Received CLS_UDATA_STN from Core0:07:44: CSM: Received netbios frame type 80:07:44: CSM: Write to peer 0 ok.In the following example, the output from the showdlswreachabilitycommand indicates that GINGER is onthe Ethernet interface and MARIAN is on the Token Ring interface:
Router# show dlsw reachabilityDLSw MAC address reachability cache listMac Addr status Loc. peer/port rif0004.f545.24e6 FOUND LOCAL P007-S000 --no rif--0800.5a30.7a9b FOUND LOCAL P000-S000 06C0.0621.7D00
P007-S000 F0F8.0006.A6FC.005F.F100.0000.0000.0000DLSw NetBIOS Name reachability cache listNetBIOS Name status Loc. peer/port rifGINGER FOUND LOCAL P007-S000 --no rif--MARIAN FOUND LOCAL P000-S000 06C0.0621.7D00
P007-S000 --no rif--
Cisco IOS Debug Command Reference - Commands A through D618
debug decnet adj through debug dss ipx eventdebug dlsw
debug dmsp doc-to-fax
In release 12.3(8)T, the debugdmspdoc-to-fax command is replaced by the debugfaxdmsp command.See the debugfaxdmsp command for more information.
Note
To display debugging messages for the doc Media Service Provider (docMSP) TIFF or text2Fax engine, usethe debugdmspdoc-to-faxcommand in privileged EXECmode. To disable debugging output, use the no formof this command.
debug dmsp doc-to-fax [text-to-fax| tiff-reader]
no debug dmsp doc-to-fax [text-to-fax| tiff-reader]
Syntax Description (Optional) Displays debugging messages that occurwhile the DocMSP Component is receiving textpackets and producing T4 fax data.
text-to-fax
(Optional) Displays debugging messages that occurwhile the DocMSP Component is receiving TIFFpackets and producing T4 fax data.
tiff-reader
Command Default No default behavior or values.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced on the Cisco AS5300 access server.12.1(3)XI
This command was replaced by the debugfaxdmsp command in the CiscoIOS 12.3T release.
12.3(8)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Examples The following is sample output from the debugdmspdoc-to-fax command:
Router# debug dmsp doc-to-faxJan 1 04:58:39.898: docmsp_call_setup_request: callid=18Jan 1 04:58:39.902: docmsp_call_setup_request(): ramp data dir=OFFRAMP, conf dir=SRCJan 1 04:58:39.902: docmsp_caps_ind: call id=18, src=17Jan 1 04:58:39.902: docmsp_bridge cfid=5, srccid=18, dstcid=17Jan 1 04:58:39.902: docmsp_bridge(): ramp data dir=OFFRAMP, conf dir=SRC, encode out=2
Cisco IOS Debug Command Reference - Commands A through D 619
debug decnet adj through debug dss ipx eventdebug dmsp doc-to-fax
Jan 1 04:58:39.902: docmsp_rcv_msp_ev: call id =18, evID = 42Jan 1 04:58:39.902: docmsp_bridge cfid=6, srccid=18, dstcid=15Jan 1 04:58:39.902: docmsp_bridge(): ramp data dir=OFFRAMP, conf dir=DEST, encode out=2Jan 1 04:58:39.902: docmsp_process_rcv_data: call id src=0, dst=18Jan 1 04:58:39.902: docmsp_generate_page:Jan 1 04:58:39.902: docmsp_generate_page: new context for Call 18Jan 1 04:58:39.922: docmsp_get_msp_event_buffer:Jan 1 04:58:42.082: docmsp_xmit: call id src=15, dst=18Jan 1 04:58:42.082: docmsp_process_rcv_data: call id src=15, dst=18Jan 1 04:58:42.082: offramp_data_process:Jan 1 04:58:42.102: docmsp_xmit: call id src=15, dst=18Jan 1 04:58:42.106: docmsp_process_rcv_data: call id src=15, dst=18Jan 1 04:58:42.106: offramp_data_process:Jan 1 04:58:42.122: docmsp_xmit: call id src=15, dst=18Jan 1 04:58:42.126: docmsp_process_rcv_data: call id src=15, dst=18Jan 1 04:58:42.126: offramp_data_process:Jan 1 04:58:42.142: docmsp_xmit: call id src=15, dst=18Jan 1 04:58:42.146: docmsp_xmit: call id src=15, dst=18
Related Commands DescriptionCommand
Displays debugging messages for doc MPSfax-to-doc.
debug dmsp fax-to-doc
Cisco IOS Debug Command Reference - Commands A through D620
debug decnet adj through debug dss ipx eventdebug dmsp doc-to-fax
debug dmsp fax-to-doc
In release 12.3(8)T, the debugdmspfax-to-doccommand is replaced by the debugfaxdmsp command.See the debugfaxdmsp command for more information.
Note
To display debugging messages for doc MSP (docMSP) fax-to-doc, use thedebugdmspfax-to-doccommandinprivilegedEXEC mode. To disable debugging output, use the no form ofthis command.
debug dmsp fax-to-doc [tiff-writer]
no debug dmsp fax-to-doc [tiff-writer]
Syntax Description (Optional) Displays debug messages that occur whilethe DocMSPComponent is receiving T4 fax data andproducing TIFF packets.
tiff-writer
Command Default No default behavior or values.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced on the Cisco AS5300 access server.12.1(3)XI
This command was replaced by the debugfaxdmsp command in the CiscoIOS 12.3T release.
12.3(8)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Examples The following is sample output from the debugdmspfax-to-doc command:
Router# debug dmsp fax-to-doc*Oct 16 08:29:54.487: docmsp_call_setup_request: callid=22*Oct 16 08:29:54.487: docmsp_call_setup_request(): ramp data dir=OFFRAMP, conf dir=SRC*Oct 16 08:29:54.487: docmsp_caps_ind: call id=22, src=21*Oct 16 08:29:54.487: docmsp_bridge cfid=15, srccid=22, dstcid=21*Oct 16 08:29:54.487: docmsp_bridge(): ramp data dir=OFFRAMP, conf dir=SRC, encode out=2*Oct 16 08:29:54.487: docmsp_bridge cfid=16, srccid=22, dstcid=17*Oct 16 08:29:54.487: docmsp_bridge(): ramp data dir=OFFRAMP, conf dir=DEST, encode out=2*Oct 16 08:29:54.487: docmsp_xmit: call id src=17, dst=22*Oct 16 08:29:54.487: docmsp_process_rcv_data: call id src=17, dst=22*Oct 16 08:29:54.487: offramp_data_process:
Cisco IOS Debug Command Reference - Commands A through D 621
debug decnet adj through debug dss ipx eventdebug dmsp fax-to-doc
*Oct 16 08:29:54.515: docmsp_get_msp_event_buffer:*Oct 16 08:29:56.115: docmsp_call_setup_request: callid=24*Oct 16 08:29:56.115: docmsp_call_setup_request(): ramp data dir=ONRAMP, conf dir=DEST*Oct 16 08:29:56.115: docmsp_caps_ind: call id=24, src=20*Oct 16 08:29:56.115: docmsp_bridge cfid=17, srccid=24, dstcid=20
Related Commands DescriptionCommand
Displays debugging messages for the doc MediaService Provider TIFF or text2Fax engine.
debug dmsp doc-to-fax
Cisco IOS Debug Command Reference - Commands A through D622
debug decnet adj through debug dss ipx eventdebug dmsp fax-to-doc
debug dmvpnTo display debug Dynamic Multipoint VPN (DMVPN) session information, use the debug dmvpn commandin privileged EXEC mode. To disable debugging output, use the no form of this command.
debug dmvpn {all| error| detail| packet} {all| debug-type}
no debug dmvpn {all| error| detail| packet} {all| debug-type}
Syntax Description Enables all levels of debugging.all
Enables error-level debugging.error
Enables detail-level debugging.detail
Enables packet-level debugging.packet
Enables NHRP, sockets, tunnel protection, and cryptodebugging.
all
The type of debugging that you want to enable. Thefollowing keywords can be specified for thedebug-type argument:
• nhrp -- Enables Next Hop Resolution Protocol(NHRP) debugging only.
• crypto -- Enables crypto Internet KeyExchange (IKE) and IPsec debugging.
• tunnel -- Enables tunnel protection debugging.
• socket -- Enables crypto secure socketdebugging.
The keywords can be used alone, or in anycombination with each other, but each keyword canbe used only once.
debug-type
Command Default DMVPN debugging is disabled.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.4(9)T
Cisco IOS Debug Command Reference - Commands A through D 623
debug decnet adj through debug dss ipx eventdebug dmvpn
ModificationRelease
This command is supported in the Cisco IOS Release 12.2SX train. Supportin a specific 12.2SX release of this train depends on your feature set,platform, and platform hardware.
12.2SX
This commandwas modified. This commandwas integrated into Cisco IOSXE Release 2.5.
Cisco IOS XE Release 2.5
Usage Guidelines You must specify both the level and the type of debugging that you want to enable. The debugging levels areall, error, detail, or packet. You can enable NHRP, crypto Internet Key Exchange (IKE) and IPsec, tunnelprotection, and crypto secure socket debugging at any of the four debugging levels.
To enable conditional DMVPN debugging, you must first specify the level and type of debugging that youwant to enable, and then use the debug dmvpn condition command to specify the conditions that you wantto enable.
Error-Level Debugging
When error-level debugging is enabled with the debug dmvpn errorcommand, the following debuggingcommands are enabled by default:
• debug crypto ipsec error
• debug crypto isakmp error
• debug nhrp error
Detail-Level Debugging
When detail-level debugging is enabled with the debug dmvpn detailcommand, the following debuggingcommands are enabled by default:
• debug crypto ipsec
• debug crypto isakmp
• debug crypto sockets
• debug nhrp
• debug nhrp cache
• debug nhrp rate
• debug tunnel protection
Packet-Level Debugging
When packet-level debugging is enabled with the debug dmvpn packetcommand, the following debuggingcommands are enabled by default:
• debug nhrp extension
• debug nhrp packet
Cisco IOS Debug Command Reference - Commands A through D624
debug decnet adj through debug dss ipx eventdebug dmvpn
Executing the debug dmvpn all command with a high number of active sessions may result in high CPUutilization and large data output.
Note
NHRP Shortcut Route Debugging
When shortcut switching is enabled on the router, the system looks up the NHRP shortcut route in the RoutingInformation Base (RIB) in order to forward the packet to the next-hop in the DMVPN cloud.
The table below describes the debug messages displayed by the router when shortcut switching and NHRPdebugging are both enabled.
Table 77: Sample Messages for Shortcut Switching and NHRP
Sample MessageEvent
*Feb 21 13:11:24.043: NHRP: Adding routeentry for 172.16.99.0 to RIB*Feb 21 13:11:24.043: NHRP: Route additionto RIB successful
NHRP successfully adds a route to the RIB
*Feb 21 13:11:24.043: NHRP: Adding routeentry for 172.16.99.0 to RIB*Feb 21 13:11:24.043: NHRP: Route additionto RIB failed
NHRP is unable to add a route to the RIB
*Feb 21 13:11:24.043: NHRP: Deleting routeentry for 172.16.99.0 from RIB
NHRP removes a route from the RIB
*Mar 1 18:24:29.371: NHRP: Route entry172.16.22.0/24 clobbered by distance
NHRP evicts a route from the RIB
*Mar 1 00:14:16.799: NHRP: Administrativedistance changed to 240
NHRP changes the administrative distance
Examples The following example shows how to enable all debugging levels for DMVPN tunnel debugging:
Router# debug dmvpn all tunnel
Related Commands DescriptionCommand
Enables error debugging for a crypto area.debug crypto error
Displays IPsec events.debug crypto ipsec
Displays messages about IKE events.debug crypto isakmp
Display conditional debug DMVPN sessioninformation.
debug dmvpn condition
Cisco IOS Debug Command Reference - Commands A through D 625
debug decnet adj through debug dss ipx eventdebug dmvpn
DescriptionCommand
Enables NHRP conditional debugging.debug nhrp condition
Displays NHRP error-level debugging information.debug nhrp error
Cisco IOS Debug Command Reference - Commands A through D626
debug decnet adj through debug dss ipx eventdebug dmvpn
debug dmvpn conditionTo display conditional debug DynamicMultipoint VPN (DMVPN) session information, use the debug dmvpnconditioncommand in privileged EXECmode. To disable debugging output, use the no form of this command.
debug dmvpn condition {unmatched| peer {nbma| tunnel {ipv4-address| ipv6-address}}| vrf vrf-name|interface tunnel tunnel-interface}
no debug dmvpn condition [unmatched| peer {nbma| tunnel {ipv4-address| ipv6-address}}| vrf vrf-name|interface tunnel number]
Syntax Description Specifies debugging when context information is notavailable.
unmatched
Specifies information for a specific DMVPN peer.peer
Displays DMVPN information based on the peermapping nonbroadcast access (NBMA) address.
nbma
Displays DMVPN information based on the peerVirtual Private Network (VPN) address.
tunnel
The DMVPN peer IPv4 address.ipv4-address
The DMVPN peer IPv6 address.
Cisco IOS XE Release 2.5 does not supportthe ipv6-address argument.
Note
ipv6-address
Displays information based on the specified virtualrouting and forwarding (VRF) name.
vrf
The VRF name.vrf-name
Displays DMVPN information based on a specificinterface.
interface
Specifies the tunnel address for a DMVPN peer.tunnel
The tunnel interface number.number
Command Default DMVPN conditional debugging is disabled.
Command Modes Privileged EXEC (#)
Cisco IOS Debug Command Reference - Commands A through D 627
debug decnet adj through debug dss ipx eventdebug dmvpn condition
Command History ModificationRelease
This command was introduced.12.4(9)T
This command is supported in the Cisco IOSRelease 12.2SX train. Supportin a specific 12.2SX release of this train depends on your feature set,platform, and platform hardware.
12.2SX
The ipv6-address argument was added.12.4(20)T
This commandwasmodified. It was integrated into Cisco IOSXERelease2.5.
Cisco IOS XE Release 2.5
Usage Guidelines Conditional debugging is enabled only after the DMVPN debugging type and level have been specified usingthe debug dmvpn command.
Console Output
The following debug dmvpn commands do not have any console output on the Cisco 3845 and Cisco 7200series routers:
• debug dmvpn condition interface
• debug dmvpn condition peer
• debug dmvpn condition unmatched
• debug dmvpn condition vrf
When the debug dmvpn condition unmatched command is enabled on the Cisco 3845 and Cisco 7200series routers, issuing the show debugging command does not produce any console output.
Note
Examples The following example shows how to enable conditional DMVPN debugging for a specific peer NBMAaddress:
Router# debug dmvpn condition peer nbma 192.0.2.1
The following example shows how to enable conditional DMVPN debugging when context is not availableto check against debugging conditions:
Router# debug dmvpn condition unmatched
The following example shows how to disable conditional debugging for a specific tunnel interface:
Router# no debug dmvpn condition interface tunnel 1
Cisco IOS Debug Command Reference - Commands A through D628
debug decnet adj through debug dss ipx eventdebug dmvpn condition
The following example shows how to disable all conditional debugging:
Router# no debug dmvpn condition
Related Commands DescriptionCommand
Enables error debugging for a crypto area.debug crypto error
Displays IPsec events.debug crypto ipsec
Displays messages about IKE events.debug crypto isakmp
Displays debug DMVPN session information.debug dmvpn
Enables NHRP conditional debugging.debug nhrp condition
Displays NHRP error-level debugging information.debug nhrp error
Cisco IOS Debug Command Reference - Commands A through D 629
debug decnet adj through debug dss ipx eventdebug dmvpn condition
debug dot11To enable debugging of radio functions, use the debugdot11command in privileged EXEC mode. To stop ordisable the debug operation, use the no form of this command.
debug dot11 {events| forwarding| mgmt| packets| syslog| virtual-interface}
no debug dot11 {events| forwarding| mgmt| packets| syslog| virtual-interface}
Syntax Description Displays information about all radio-related events.events
Displays information about radio-forwarded packets.forwarding
Displays information about radio access pointmanagement activity.
mgmt
Displays information about received or transmittedradio packets.
packets
Displays information about the radio system log.syslog
Displays information about radio virtual interfaces.virtual-interface
Command Default Debugging is disabled.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(4)JA
This command was integrated into Cisco IOS Release 12.4(2)T.12.4(2)T
This command is supported in the Cisco IOS Release 12.2SX train. Supportin a specific 12.2SX release of this train depends on your feature set, platform,and platform hardware.
12.2SX
Usage Guidelines Use this command to display debugging information about radio functions.
Cisco IOS Debug Command Reference - Commands A through D630
debug decnet adj through debug dss ipx eventdebug dot11
Examples The following example shows how to enable debugging of all radio-related events:
Router# debug dot11 events
Related Commands DescriptionCommand
Enables debugging of dot11 AAA operations.debug dot11 aaa
Enables radio debug options.debug dot11 dot11radio
Cisco IOS Debug Command Reference - Commands A through D 631
debug decnet adj through debug dss ipx eventdebug dot11
debug dot11 aaaTo enable debugging of dot11 authentication, authorization, and accounting (AAA) operations, use thedebugdot11aaacommand in privileged EXEC mode. To disable or stop the debug operation, use the no formof this command.
debug dot11 aaa {accounting| authenticator {all| dispatcher| mac-authen| process| rxdata| state-machine|txdata}| dispatcher|manager {all| dispatcher| keys| rxdata| state-machine| supplicant| txdata}}
no debug dot11 aaa {accounting| authenticator {all| dispatcher| mac-authen| process| rxdata|state-machine| txdata}| dispatcher|manager {all| dispatcher| keys| rxdata| state-machine| supplicant|txdata}}
Syntax Description Provides information about 802.11 AAA accountingpackets.
accounting
Provides information about MAC and ExtensibleAuthentication Protocol (EAP) authentication packets.
Use the following options to activate authenticatordebugging:
• all--Activates debugging for all authenticatorpackets
• dispatcher--Activates debugging forauthentication request handler packets
• mac-authen--Activates debugging for MACauthentication packets
• process--Activates debugging for authenticatorprocess packets
• rxdata--Activates debugging for EAP over LAN(EAPOL) packets from client devices
• state-machine--Activates debugging forauthenticator state-machine packets
• txdata--Activates debugging for EAPOLpacketssent to client devices
authenticator
Provides information about 802.11 AAA dispatcher(interface between association and manager) packets.
dispatcher
Cisco IOS Debug Command Reference - Commands A through D632
debug decnet adj through debug dss ipx eventdebug dot11 aaa
Provides information about the AAA manager. Usethese options to activate AAA manager debugging:
• all --Activates all AAA manager debugging
• dispatcher --Activates debug information forAAA manager-authenticator dispatch traffic
• keys --Activates debug information for AAAmanager key processing
• rxdata --Activates debugging for AAAmanagerpackets received from client devices
• state-machine --Activates debugging for AAAmanager state-machine packets
• supplicant --Activates debugging for LightExtensible Authentication Protocol (LEAP)supplicant packets
• txdata --Activates debugging for AAAmanagerpackets sent to client devices.
manager
Command Default Debugging is disabled.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(4)JA
This commandwasmodified to include the accounting, authenticator, dispatcher,and manager debugging options.
12.2(15)JA
This command was integrated into Cisco IOS Release 12.4(2)T.12.4(2)T
This command is supported in the Cisco IOS Release 12.2SX train. Supportin a specific 12.2SX release of this train depends on your feature set, platform,and platform hardware.
12.2SX
Usage Guidelines Use this command to display debugging information about dot11 AAA operations.
Examples The following example shows how to activate debugging for 802.11 AAA accounting packets:
Router# debug dot11 aaa accounting
Cisco IOS Debug Command Reference - Commands A through D 633
debug decnet adj through debug dss ipx eventdebug dot11 aaa
Related Commands DescriptionCommand
Enables debugging of radio functions.debug dot11
Enables radio debug options.debug dot11 dot11radio
Cisco IOS Debug Command Reference - Commands A through D634
debug decnet adj through debug dss ipx eventdebug dot11 aaa
debug dot11 cacUse the debugdot11cac privileged EXEC command to begin debugging of admission control radio functions.Use the noform of this command to stop the debug operation.
[no] debug dot11 cac {events| unit}
Syntax Description Activates debugging of radio admission controlevents.
events
Activates verbose debugging of radio admissioncontrol events.
unit
Command Default Debugging is not enabled.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.3(8)JA
This command is supported in the Cisco IOS Release 12.2SX train. Supportin a specific 12.2SX release of this train depends on your feature set, platform,and platform hardware.
12.2SX
Examples This example shows how to begin debugging of all admission control radio-related events:
SOAP-AP# debug dot11 cac eventsThis example shows how to begin verbose debugging of all admission control radio-related events:
SOAP-AP# debug dot11 cac unitThis example shows how to stop debugging of all admission control radio-related events:
SOAP-AP# debug dot11 cac eventsThis example shows how to stop verbose debugging of all admission control radio-related events:
SOAP-AP# no debug dot11 cac unit
Cisco IOS Debug Command Reference - Commands A through D 635
debug decnet adj through debug dss ipx eventdebug dot11 cac
Related Commands
This command is not supported on repeaters.Note
DescriptionCommand
Enables CAC admission control for an SSID on theaccess point.
admin-traffic (SSID configuration mode)
Configures CAC admission control on the accesspoint.
admit-traffic (QOS Class interface configurationmode)
Displays all debug settings and the debug packetheaders
show debugging
Displays all CAC radio events on the access point.show dot11 ids eap
Configures CAC traffic data rates and priorities fora radio interface on the access point.
traffic-stream
Cisco IOS Debug Command Reference - Commands A through D636
debug decnet adj through debug dss ipx eventdebug dot11 cac
debug dot11 dot11radioTo enable radio debug options, use the debugdot11dot11radiocommand in privileged EXEC mode. Todisable debug options, use the no form of this command.
debug dot11 dot11radio interface {accept-radio-firmware| dfs simulate [ channel ]|monitor {ack| address|beacon| crc| lines| plcp| print| probe| store}| print {hex| if| iv| lines| mic| plcp| printf| raw| shortadr}|stop-on-failure| trace {off| print| store}}
no debug dot11 dot11radio interface {accept-radio-firmware| dfs simulate [ channel ]|monitor {ack|address| beacon| crc| lines| plcp| print| probe| store}| print {hex| if| iv| lines| mic| plcp| printf| raw|shortadr}| stop-on-failure| trace {off| print| store}}
Syntax Description The radio interface. The 2.4-GHz radio is 0. The5-GHz radio is 1.
interface
Configures the access point to disable checking theradio firmware version.
accept-radio-firmware
Configures the access point to simulate radargeneration as part of Dynamic Frequency Selection(DFS).
dfs simulate
(Optional) Radio channel to move to. Range is from24 to 161.
channel
Enables RF monitor mode. Use these options to turnon monitor modes:
• ack --Displays ACK packets. ACK packetsacknowledge receipt of a signal, information,or packet.
• address --Displays packets to or from thespecified IP address
• beacon --Displays beacon packets
• crc --Displays packets with CRC errors
• lines --Specifies a print line count
• plcp --Displays Physical Layer Control Protocol(PLCP) packets
• print --Enables RF monitor printing mode
• probe --Displays probe packets
• store --Enables RF monitor storage mode
monitor
Cisco IOS Debug Command Reference - Commands A through D 637
debug decnet adj through debug dss ipx eventdebug dot11 dot11radio
Enables packet printing. Use these options to turn onpacket printing:
• hex --Prints entire packets without formatting
• if --Prints the in and out interfaces for packets
• iv --Prints the packet Wired Equivalent Privacy(WEP) IV
• lines --Prints the line count for the trace
• mic --Prints the CiscoMessage Integrity Check(MIC)
• plcp --Displays the PLCP
• printf --Prints using printf instead of buginf
• raw --Prints without formatting data
• shortadr --PrintsMAC addresses in short form
Configures the access point to not restart when theradio driver fails.
stop-on-failure
Enables trace mode. Use these options to turn on tracemodes:
• off --Turns off traces
• print --Enables trace printing
• store --Enables trace storage
trace
Command Default Debugging is disabled.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.2(4)JA
This command was integrated into Cisco IOS Release 12.4(2)T.12.4(2)T
This command is supported in the Cisco IOS Release 12.2SX train. Supportin a specific 12.2SX release of this train depends on your feature set, platform,and platform hardware.
12.2SX
Cisco IOS Debug Command Reference - Commands A through D638
debug decnet adj through debug dss ipx eventdebug dot11 dot11radio
Usage Guidelines Use this command to display debugging information about radio options.
Examples This example shows how to begin monitoring of all packets with CRC errors:
Router# debug dot11 dot11radio 0 monitor crc
Related Commands DescriptionCommand
Enables debugging of radio functions.debug dot11
Enables debugging of dot11 AAA operations.debug dot11 aaa
Cisco IOS Debug Command Reference - Commands A through D 639
debug decnet adj through debug dss ipx eventdebug dot11 dot11radio
debug dot11 idsUse the debugdot11idseap privileged EXEC command to enable debugging for wireless IDS monitoring.Use the no form of the command to disable IDS debugging.
[no] debug dot11 ids {eap| cipher-errors}
Syntax Description Activates debugging of IDS authentication eventseap
Activates debugging of cipher errors detected by IDScipher-errors
Command Default Debugging is not enabled.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.3(4)JA
This command is supported in the Cisco IOS Release 12.2SX train. Supportin a specific 12.2SX release of this train depends on your feature set, platform,and platform hardware.
12.2SX
Examples This example shows how to activate wireless IDS debugging for authentication events:
SOAP-AP# debug dot11 ids eap
Related Commands
This command is not supported on 1400 series bridges.Note
DescriptionCommand
Configures limits on authentication attempts andEAPOL flooding on scanner access points in monitormode
dot11 ids eap attempts
Displays all debug settings and the debug packetheaders
show debugging
Cisco IOS Debug Command Reference - Commands A through D640
debug decnet adj through debug dss ipx eventdebug dot11 ids
DescriptionCommand
Displays wireless IDS statisticsshow dot11 ids eap
Cisco IOS Debug Command Reference - Commands A through D 641
debug decnet adj through debug dss ipx eventdebug dot11 ids
debug dot11 ids mfpUse the debug dot11 ids mfp privileged EXEC command to debug Management Frame Protection (MFP)operations on the access point.
{[no] debug dot11 ids mfpap [all] [detectors] [events] [generators] [io] [reporting]| wds [all] [detectors][events] [generators] [reporting] [statistics]| wlccp}
Syntax Description Debugs MFP events on the access point.ap
Debugs all MFP events.all
Debugs MFP detector key management events.detectors
Debugs high level MFP events.events
Debugs MFP generator key management events.generators
DebugsMFP IO (generate or detect frame) events.io
Debugs MFP reporting events.reporting
Debugs MFP WDS statistics received from thedetectors.
statistics
Debugs MFP WDS events.wds
Debugs MFP WLCCP messages.wlccp
Command Default There are no defaults for this command.
Command Modes Privileged EXEC (#)
Command History ModificationRelease
This command was introduced.12.3(8)JA
This command is supported in the Cisco IOS Release 12.2SX train. Supportin a specific 12.2SX release of this train depends on your feature set, platform,and platform hardware.
12.2SX
Cisco IOS Debug Command Reference - Commands A through D642
debug decnet adj through debug dss ipx eventdebug dot11 ids mfp
Examples This example shows how to debug the MFP detectors on the access point:
ap(config)# debug dot11 ids mfp ap detectors
Related Commands DescriptionCommand
Configures MFP parameters on the access point.dot11 ids mfp
Displays MFP parameters on the access point.show dot11 ids mfp
Cisco IOS Debug Command Reference - Commands A through D 643
debug decnet adj through debug dss ipx eventdebug dot11 ids mfp
debug dot1xTo display 802.1X debugging information, use the debugdot1x command in privileged EXEC mode. Todisable debugging output, use the no form of this command.
debug dot1x [all| errors| events| feature| packets| redundancy| registry| state-machine]
no debug dot1x [all| errors| events| feature| packets| redundancy| registry| state-machine]
Syntax Description (Optional) Enables all 802.1X debugging messages.all
(Optional) Provides information about all 802.1Xerrors.
errors
(Optional) Provides information about all 802.1Xevents.
events
(Optional) Provides information about 802.1Xfeatures for switches only.
feature
(Optional) Provides information about all 802.1Xpackets.
packets
(Optional) Provides information about 802.1Xredundancy.
redundancy
(Optional) Provides information about 802.1Xregistries.
registry
(Optional) Provides information regarding the 802.1Xstate machine.
state-machine
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.1(11)AX
The authsm, backend, besm, core, and reauthsm keywords were removed.The errors, events, packets, registry, and state-machine keywords wereadded.
12.1(14)EA1
This command was integrated into Cisco IOS Release 12.3(2)XA.12.3(2)XA
This command was integrated into Cisco IOS Release 12.3(4)T.12.3(4)T
Cisco IOS Debug Command Reference - Commands A through D644
debug decnet adj through debug dss ipx eventdebug dot1x
ModificationRelease
The supplicant keyword was added.12.3(11)T
The feature keyword was added for switches only.12.2(25)SEE
The redundancy keyword was added. The aaa, process, rxdata,supplicant, txdata, and vlan keywords were deleted.
12.4(6)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Examples The following is sample output for the debugdot1x command:
Router# debug dot1x
Router-871#debug dot1x all*Nov 7 13:07:56.872: dot1x-ev:dot1x_mgr_pre_process_eapol_pak: Role determination notrequired on FastEthernet1.*Nov 7 13:07:56.876: dot1x-packet:dot1x_mgr_process_eapol_pak: queuing an EAPOL pkt onAuthenticator Q*Nov 7 13:07:56.876: dot1x-ev:Enqueued the eapol packet to the global authenticator queue*Nov 7 13:07:56.876: dot1x-packet:Received an EAPOL frame on interface FastEthernet1*Nov 7 13:07:56.876: dot1x-ev:Received pkt saddr =000f.23c4.a401 , daddr = 0180.c200.0003,
pae-ether-type = 888e.0202.0000*Nov 7 13:07:56.876: dot1x-packet:Received an EAPOL-Logoff packet on interface FastEthernet1*Nov 7 13:07:56.876: EAPOL pak dump rx*Nov 7 13:07:56.876: EAPOL Version: 0x2 type: 0x2 length: 0x0000*Nov 7 13:07:56.876: dot1x-sm:Posting EAPOL_LOGOFF on Client=82AC85CC*Nov 7 13:07:56.876: dot1x_auth Fa1: during state auth_authenticating, got event7(eapolLogoff)The fields in the output are self-explanatory.
Related Commands DescriptionCommand
Clears 802.1X interface information.clear dot1x
Creates an identity profile and enters identity profileconfiguration mode.
identity profile default
Displays details for an identity profile.show dot1x
Cisco IOS Debug Command Reference - Commands A through D 645
debug decnet adj through debug dss ipx eventdebug dot1x
debug dot1x (EtherSwitch)To enable debugging of the 802.1x protocol when an Ethernet switch network module is installed, use thedebugdot1x command in privileged EXEC mode. To disable debugging output, use the no form of thiscommand.
debug dot1x {all| authsm| backend| besm| core| reauthsm}
no debug dot1x {all| authsm| backend| besm| core| reauthsm}
Syntax Description Enables debugging of all conditions.all
Enables debugging of the authenticator state machine,which is responsible for controlling access to thenetwork through 802.1x-enabled ports.
authsm
Enables debugging of the interaction between the802.1x process and the router RADIUS client.
backend
Enables debugging of the backend state machine,which is responsible for relaying authenticationrequest between the client and the authenticationserver.
besm
Enables debugging of the 802.1x process, whichincludes 802.1x initialization, configuration, and theinteraction with the port manager module.
core
Enables debugging of the reauthentication statemachine, which manages periodic reauthenticationof the client.
reauthsm
Command Default Debugging is disabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.1(6)EA2
This command was implemented on the following platforms: Cisco 2600series, Cisco 3600 series, and Cisco 3700 series routers.
12.2(15)ZJ
Cisco IOS Debug Command Reference - Commands A through D646
debug decnet adj through debug dss ipx eventdebug dot1x (EtherSwitch)
ModificationRelease
This command was integrated into Cisco IOS Release 12.3(4)T on thefollowing platforms: Cisco 2600 series, Cisco 3600 series, and Cisco 3700series routers.
12.3(4)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines The undebugdot1x command is the same as the nodebugdot1x command.
Related Commands DescriptionCommand
Displays information about the types of debuggingthat are enabled.
show debugging
Displays 802.1x statistics, administrative status, andoperational status for the router or for the specifiedinterface.
show dot1x
Cisco IOS Debug Command Reference - Commands A through D 647
debug decnet adj through debug dss ipx eventdebug dot1x (EtherSwitch)
debug drip eventTo display debugging messages for Duplicate Ring Protocol (DRiP) events, use the debugdripeventcommandin privileged EXEC mode. To disable debugging output, use the no form of this command.
debug drip event
no debug drip event
Syntax Description This command has no arguments or keywords.
Command Default Debugging is disabled for DRiP events.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.11.3(4)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines When a TrBRF interface is configured on the Remote Switch Module (RSM), the DRiP protocol is activated.The DRiP protocol adds the VLAN ID specified in the router command to its database and recognizes theVLAN as a locally configured, active VLAN.
Examples The following is sample output from the debugdripevent command:
Router# debug drip eventDRiP gets a packet from the network:
612B92C0: 01000C00 00000000 0C501900 0000AAAA .........P....**612B92D0: 0300000C 00020000 00000100 0CCCCCCC .............LLL612B92E0: 00000C50 19000020 AAAA0300 000C0102 ...P... **......612B92F0: 01010114 00000002 00000002 00000C50 ...............P612B9300: 19000001 04C00064 04 [email protected] gets a packet from the network:
Recvd. pakDRiP recognizes that the VLAN ID it is getting is a new one from the network:
6116C840: 0100 0CCCCCCC ...LLL6116C850: 00102F72 CBFB0024 AAAA0300 000C0102 ../rK{.$**......6116C860: 01FF0214 0002E254 00015003 00102F72 ......bT..P.../r6116C870: C8000010 04C00014 044003EB 14 H....@[email protected] : remote update - Never heard of this vlan
Cisco IOS Debug Command Reference - Commands A through D648
debug decnet adj through debug dss ipx eventdebug drip event
DRiP attempts to resolve any conflicts when it discovers a new VLAN. The value action = 1 means to notifythe local platform of change in state.
DRIP : resolve remote for vlan 20 in VLAN0DRIP : resolve remote - action = 1The local platform is notified of change in state:
DRIP Change notification active vlan 20Another new VLAN ID was received in the packet:
DRIP : resolve remote for vlan 1003 in Vlan0No action is required:
DRIP : resolve remote - action = 0Thirty seconds have expired, and DRiP sends its local database entries to all its trunk ports:
DRIP : local timer expiredDRIP : transmit on 0000.0c50.1900, length = 24612B92C0: 01000C00 00000000 0C501900 0000AAAA .........P....**612B92D0: 0300000C 00020000 00000100 0CCCCCCC .............LLL612B92E0: 00000C50 19000020 AAAA0300 000C0102 ...P... **......612B92F0: 01FF0114 00000003 00000002 00000C50 ...............P612B9300: 19000001 04C00064 04 [email protected].
Cisco IOS Debug Command Reference - Commands A through D 649
debug decnet adj through debug dss ipx eventdebug drip event
debug drip packetTo display debuggingmessages for Duplicate Ring Protocol (DRiP) packets, use the debugdrippacketcommandin privileged EXEC mode. To disable debugging output, use the no form of this command.
debug drip packet
no debug drip packet
Syntax Description This command has no arguments or keywords.
Command Default Debugging is not enabled for DRiP packets.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.11.3(4)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines Before you use this command, you can optionally use the cleardrip command first. As a result the DRiPcounters are reset to 0. If the DRiP counters begin to increment, the router is receiving packets.
Examples The following is sample output from the debugdrippacket command:
Router# debug drip packetThe following type of output is displayed when a packet is entering the router and you use the showdebugcommand:
039E5FC0: 0100 0CCCCCCC 00E0A39B 3FFB0028 ...LLL.`#.?{.(039E5FD0: AAAA0300 000C0102 01FF0314 0000A5F6 **............%v039E5FE0: 00008805 00E0A39B 3C000000 04C00028 .....`#.<....@.(039E5FF0: 04C00032 044003EB 0F [email protected][email protected]: 01000C00 00000010 ........The following type of output is displayed when a packet is sent by the router:
039FBD30: A6AEB450 0000AAAA 0300000C 00020000 &.4P..**........039FBD40: 00000100 0CCCCCCC 0010A6AE B4500020 .....LLL..&.4P.039FBD50: AAAA0300 000C0102 01FF0114 00000003 **..............039FBD60: 00000002 0010A6AE B4500001 04C00064 ......&[email protected]: 04 .
Cisco IOS Debug Command Reference - Commands A through D650
debug decnet adj through debug dss ipx eventdebug drip packet
Related Commands DescriptionCommand
Displays debugging messages for DRiP events.debug drip event
Cisco IOS Debug Command Reference - Commands A through D 651
debug decnet adj through debug dss ipx eventdebug drip packet
debug dsc clockTo display debugging output for the time-division multiplexing (TDM) clock-switching events on the dialshelf controller (DSC), use the debugdscclock command in privileged EXEC mode. To disable debuggingoutput, use the no form of this command.
[execute-on] debug dsc clock
[execute-on] no debug dsc clock
Syntax Description This command has no arguments or keywords; however, it can be used with the execute-on command.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.11.3(2)AA
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines To perform this command from the router shelf on the Cisco AS5800 series platform, use theexecute-onslotslot-numberdebugdscclock form of this command.
The debugdscclock command displays TDM clock-switching events on the dial shelf controller. Theinformation displayed includes the following:
• Clock configuration messages received from trunks via NBUS
• Dial shelf controller clock configuration messages from the router shelf over the dial shelf interface link
• Clock switchover algorithm events
Examples The following example shows that the debugdscclock command has been enabled, and that trunk messagesare received, and that the configuration message has been received:
AS5800# debug dsc clockDial Shelf Controller Clock debugging is onAS5800#00:02:55: Clock Addition msg of len 12 priority 8 from slot 1 port 1 on line 000:02:55: Trunk 1 has reloaded
Related Commands DescriptionCommand
Executes commands remotely on a line card.execute-on
Cisco IOS Debug Command Reference - Commands A through D652
debug decnet adj through debug dss ipx eventdebug dsc clock
DescriptionCommand
Displays information about the dial shelf controllerclock.
show dsc clock
Cisco IOS Debug Command Reference - Commands A through D 653
debug decnet adj through debug dss ipx eventdebug dsc clock
debug dsipTo display debugging output for Distributed System Interconnect Protocol (DSIP) used between a router shelfand a dial shelf, use thedebugdsip command in privileged EXEC mode. To disable debugging output, usethe no form of this command.
debug dsip {all| api| boot| console| trace| transport}
no debug dsip {all| api| boot| console| trace| transport}
Syntax Description View all DSIP debugging messages.all
View DSIP client interface (API) debuggingmessages.
api
ViewDSIP bootingmessages that are generated whena download of the feature board image is occurringproperly.
boot
View DSIP console operation while debugging.console
Enable logging of header information concerningDSIP packets entering the system into a trace buffer.This logged information can be viewed with theshowdsiptracing command.
trace
Debug the DSIP transport layer, the module thatinteracts with the underlying physical media driver.
transport
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.11.3(2)AA
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines The debugdsip command is used to enable the display of debugging messages for DSIP between the routershelf and the dial shelf. Using this command, you can display booting messages generated when the downloadof an image occurs, view console operation, and trace logging ofMAC header information and DSIP transportlayer information as modules interact with the underlying physical media driver. This command can be appliedto a single modem or a group of modems.
Cisco IOS Debug Command Reference - Commands A through D654
debug decnet adj through debug dss ipx eventdebug dsip
Once the debugdsiptrace command has been enabled, you can read the information captured in the tracebuffer using theshowdsiptracing command.
Examples The following example indicates the debugdsiptrace command logs MAC headers of the various classes ofDSIP packets. To view the logged information, use the showdsiptracing command:
AS5800# debug dsip traceNIP tracing debugging is onAS5800# show dsip tracingNIP Control Packet Trace------------------------------------------------------------Dest:00e0.b093.2238 Src:0007.4c72.0058 Type:200B SrcShelf:1 SrcSlot:11MsgType:0 MsgLen:82 Timestamp: 00:49:14------------------------------------------------------------Dest:00e0.b093.2238 Src:0007.4c72.0028 Type:200B SrcShelf:1 SrcSlot:5MsgType:0 MsgLen:82 Timestamp: 00:49:14------------------------------------------------------------
Related Commands DescriptionCommand
Displays information about the dial shelf, includingclocking information.
debug modem
DisplaysDSIPmedia header information logged usingthedebugdsiptrace command.
show dsip tracing
Cisco IOS Debug Command Reference - Commands A through D 655
debug decnet adj through debug dss ipx eventdebug dsip
debug dspapi
Effective with release 12.3(8)T, the debugdspapicommand is replaced by the debugvoipdspapicommand.See the debugvoipdspapicommand for more information.
Note
To enable debugging for Digital Signal Processor (DSP) application programming interface (API) messageevents, use the debugdspapi command in privileged EXEC mode. To reset the default value for this feature,use the no form of this command.
debug dspapi {all| command| detail| error| notification| response}
no debug dspapi {all| command| detail| error| notification| response}
Syntax Description Enables all debugdspapioptions (command, detail,error, notification and response).
all
Displays commands sent to the DSPs.command
Displays additional detail for the DSP API debugsenabled.
detail
Displays any DSP API errors.error
Displays notification messages sent from the DSP(for example, tone detection notification).
notification
Displays responses sent by the DSP (for example,responses to statistic requests).
response
Command Default This command is not enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced on the Cisco AS5300 and Cisco AS5800.12.1(5)XM
This command was implemented on the Cisco AS5350 and Cisco AS5400.12.1(5)XM1
This command was implemented on the Cisco 1700, Cisco 2600 series,Cisco 3600 series, and the Cisco 3810.
12.2(2)T
Cisco IOS Debug Command Reference - Commands A through D656
debug decnet adj through debug dss ipx eventdebug dspapi
ModificationRelease
This command was integrated into Cisco IOS Release 12.2(8)T.12.2(8)T
This command was replaced by the debugvoipdspapicommand.12.3(8)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines DSP API message events used to communicate with DSPs are intended for use with Connexant (Nextport)and Texas Instrument (54x) DSPs. This command severely impacts performance and should be used only forsingle-call debug capture.
Examples The following example shows how to enable debugging for all DSP API message events:
Router# debug dspapi all
Related Commands DescriptionCommand
Enables debugging for HPI message events.debug hpi
Cisco IOS Debug Command Reference - Commands A through D 657
debug decnet adj through debug dss ipx eventdebug dspapi
debug dspfarmTo display digital signal processor (DSP) farm service debugging information, use the debugdspfarmcommandin privileged EXEC mode. To disable debugging output, use the no form of this command.
debug dspfarm {all| errors| events| packets}
no debug dspfarm
Syntax Description All DSP-farm debug-trace information.all
DSP-farm errors.errors
DSP-farm events.events
DSP-farm packets.packets
Command Default No default behavior or values
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced on the Cisco VG200.12.1(5)YH
This command was implemented on the Cisco 2600 series, Cisco 3620,Cisco 3640, Cisco 3660, and Cisco 3700 series.
12.2(13)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Usage Guidelines The router on which this command is used must be equipped with one or more digital T1/E1 packet voicetrunk network modules (NM-HDVs) or high-density voice (HDV) transcoding/conferencing DSP farms(NM-HDV-FARMs) to provide DSP resources.
Debugging is turned on for all DSP-farm-service sessions. You can debug multiple sessions simultaneously,with different levels of debugging for each.
Examples The following is sample output from the debugdspfarmevents command:
Router# debug dspfarm eventsDSP Farm service events debugging is on*Mar 1 00:45:51: Sent 180 bytes to DSP 4 channel 2*Mar 1 00:45:53: Sent 180 bytes to DSP 4 channel 3
Cisco IOS Debug Command Reference - Commands A through D658
debug decnet adj through debug dss ipx eventdebug dspfarm
*Mar 1 00:45:55: Sent 180 bytes to DSP 4 channel 1*Mar 1 00:45:56: Sent 180 bytes to DSP 4 channel 2*Mar 1 00:45:58: Sent 180 bytes to DSP 4 channel 3*Mar 1 00:46:00: Sent 180 bytes to DSP 4 channel 1*Mar 1 00:46:01: xapi_dspfarm_modify_connection: sess_id 26, conn_id 2705, conn_mode 3,ripaddr 10.10.1.7, rport 20170*Mar 1 00:46:01: dspfarm_process_appl_event_queue: XAPP eve 6311C4B0 rcvd*Mar 1 00:46:01: dspfarm_find_stream: stream 63121F1C, found in sess 631143CC, cid 2705*Mar 1 00:46:01: dspfarm_modify_connection: old_mode 4, new_mode 3*Mar 1 00:46:01: dspfarm_close_local_rtp: stream 63121F1C, local_rtp_port 22656*Mar 1 00:46:01: xapi_dspfarm_enqueue_event_to_appl: handle 63120634, event 6311C4C8,eve_id 5, context 6311426C, result 0*Mar 1 00:46:01: xapi_dspfarm_delete_connection: sess_id 26, conn_id 2705*Mar 1 00:46:01: dspfarm_process_appl_event_queue: XAPP eve 6311C4E0 rcvd*Mar 1 00:46:01: dspfarm_find_stream: stream 63121F1C, found in sess 631143CC, cid 2705*Mar 1 00:46:01: dspfarm_close_local_rtp: stream 63121F1C, local_rtp_port 0*Mar 1 00:46:01: dspfarm_release_dsp_resource: sess 631143CC, stream 63121F1C, num_stream3, sess_type 2, sess_dsp_id 2040000, stream_dsp_id 2040002*Mar 1 00:46:01: dspfarm_drop_conference:slot 2 dsp 4 ch 2*Mar 1 00:46:01: dspfarm_send_drop_conf: Sent drop_conference to DSP 4 ch 2*Mar 1 00:46:01: dspfarm_xapp_enq: Sent msg 8 to DSPFARM*Mar 1 00:46:01: xapi_dspfarm_enqueue_event_to_appl: handle 63120634, event 6311C4F8,eve_id 9, context 6311426C, result 0*Mar 1 00:46:01: dspfarm_process_dsp_event_queue: DSP eve 6312078C rcvd*Mar 1 00:46:01: dspfarm_delete_stream: sess_id 26, conn_id 2705, stream 63121F1C, insess 631143CC is freed*Mar 1 00:46:01: Sent 180 bytes to DSP 4 channel 3*Mar 1 00:46:04: Sent 180 bytes to DSP 4 channel 3*Mar 1 00:46:05: xapi_dspfarm_modify_connection: sess_id 26, conn_id 2689, conn_mode 3,ripaddr 10.10.1.5, rport 19514*Mar 1 00:46:05: dspfarm_process_appl_event_queue: XAPP eve 6311C510 rcvd*Mar 1 00:46:05: dspfarm_find_stream: stream 63121E34, found in sess 631143CC, cid 2689*Mar 1 00:46:05: dspfarm_modify_connection: old_mode 4, new_mode 3*Mar 1 00:46:05: dspfarm_close_local_rtp: stream 63121E34, local_rtp_port 25834*Mar 1 00:46:05: xapi_dspfarm_enqueue_event_to_appl: handle 63120634, event 6311C528,eve_id 5, context 63114244, result 0*Mar 1 00:46:05: xapi_dspfarm_delete_connection: sess_id 26, conn_id 2689*Mar 1 00:46:05: dspfarm_process_appl_event_queue: XAPP eve 6311C540 rcvd*Mar 1 00:46:05: dspfarm_find_stream: stream 63121E34, found in sess 631143CC, cid 2689*Mar 1 00:46:05: dspfarm_close_local_rtp: stream 63121E34, local_rtp_port 0*Mar 1 00:46:05: dspfarm_release_dsp_resource: sess 631143CC, stream 63121E34, num_stream2, sess_type 2, sess_dsp_id 2040000, stream_dsp_id 2040001*Mar 1 00:46:05: dspfarm_drop_conference:slot 2 dsp 4 ch 1*Mar 1 00:46:05: dspfarm_send_drop_conf: Sent drop_conference to DSP 4 ch 1*Mar 1 00:46:05: dspfarm_xapp_enq: Sent msg 8 to DSPFARM*Mar 1 00:46:05: xapi_dspfarm_enqueue_event_to_appl: handle 63120634, event 6311C558,eve_id 9, context 63114244, result 0*Mar 1 00:46:05: dspfarm_process_dsp_event_queue: DSP eve 6311586C rcvd*Mar 1 00:46:05: dspfarm_delete_stream: sess_id 26, conn_id 2689, stream 63121E34, insess 631143CC is freed*Mar 1 00:46:05: xapi_dspfarm_modify_connection: sess_id 26, conn_id 2721, conn_mode 3,ripaddr 10.10.1.6, rport 21506*Mar 1 00:46:05: dspfarm_process_appl_event_queue: XAPP eve 6311C570 rcvd*Mar 1 00:46:05: dspfarm_find_stream: stream 63122004, found in sess 631143CC, cid 2721*Mar 1 00:46:05: dspfarm_modify_connection: old_mode 4, new_mode 3*Mar 1 00:46:05: dspfarm_close_local_rtp: stream 63122004, local_rtp_port 19912*Mar 1 00:46:05: xapi_dspfarm_enqueue_event_to_appl: handle 63120634, event 6311C588,eve_id 5, context 63114294, result 0*Mar 1 00:46:05: xapi_dspfarm_delete_connection: sess_id 26, conn_id 2721*Mar 1 00:46:05: dspfarm_process_appl_event_queue: XAPP eve 6311C5A0 rcvd*Mar 1 00:46:05: dspfarm_find_stream: stream 63122004, found in sess 631143CC, cid 2721*Mar 1 00:46:05: dspfarm_close_local_rtp: stream 63122004, local_rtp_port 0*Mar 1 00:46:05: dspfarm_release_dsp_resource: sess 631143CC, stream 63122004, num_stream1, sess_type 2, sess_dsp_id 2040000, stream_dsp_id 2040003*Mar 1 00:46:05: dspfarm_drop_conference:slot 2 dsp 4 ch 3*Mar 1 00:46:05: dspfarm_drop_conference: Last conferee - closing the conf session*Mar 1 00:46:05: dspfarm_send_close_conf: Sent close_conference to DSP 4*Mar 1 00:46:05: dspfarm_drop_conference: Removed the conf in dsp 4*Mar 1 00:46:05: dspfarm_xapp_enq: Sent msg 8 to DSPFARM*Mar 1 00:46:05: xapi_dspfarm_enqueue_event_to_appl: handle 63120634, event 6311C5B8,eve_id 9, context 63114294, result 0*Mar 1 00:46:05: dspfarm_process_dsp_event_queue: DSP eve 6311586C rcvd
Cisco IOS Debug Command Reference - Commands A through D 659
debug decnet adj through debug dss ipx eventdebug dspfarm
*Mar 1 00:46:05: dspfarm_delete_stream: sess_id 26, conn_id 2721, stream 63122004, insess 631143CC is freed
Related Commands DescriptionCommand
Sets debugging for SCCP and its applications at oneof four levels.
debug frame-relay vc-bundle
Enables DSP-farm service.dspfarm (DSP farm)
Enables SCCP and its associated transcoding andconferencing applications.
sccp
Displays summary information about DSP resources.show dspfarm
Cisco IOS Debug Command Reference - Commands A through D660
debug decnet adj through debug dss ipx eventdebug dspfarm
debug dspu activationTo display information on downstream physical unit (DSPU) activation, use the debugdspuactivationcommand in privileged EXEC mode. To disable debugging output, use the no form of this command.
debug dspu activation [ name ]
no debug dspu activation [ name ]
Syntax Description (Optional) The host or physical unit (PU) namedesignation.
name
Command Modes Privileged EXEC
Usage Guidelines The debugdspuactivation command displays all DSPU activation traffic. To restrict the output to a specifichost or PU, include the host or PU name argument. You cannot turn off debugging output for an individualPU if that PU has not been named in the debugdspuactivation command.
Examples The following is sample output from the debugdspuactivation command. Not all intermediate numbers areshown for the "activated" and "deactivated" logical unit (LU) address ranges.
Router# debug dspu activationDSPU: LS HOST3745 connectedDSPU: PU HOST3745 activatedDSPU: LU HOST3745-2 activatedDSPU: LU HOST3745-3 activated...DSPU: LU HOST3745-253 activatedDSPU: LU HOST3745-254 activatedDSPU: LU HOST3745-2 deactivatedDSPU: LU HOST3745-3 deactivated...DSPU: LU HOST3745-253 deactivatedDSPU: LU HOST3745-254 deactivatedDSPU: LS HOST3745 disconnectedDSPU: PU HOST3745 deactivatedThe table below describes the significant fields shown in the display.
Table 78: debug dspu activation Field Descriptions
DescriptionField
Downstream PU debugging message.DSPU
Link station (LS) event triggered the message.LS
Cisco IOS Debug Command Reference - Commands A through D 661
debug decnet adj through debug dss ipx eventdebug dspu activation
DescriptionField
PU event triggered the message.PU
LU event triggered the message.LU
Host name or PU name.HOST3745
Host name or PU name and the LU address, separatedby a dash.
HOST3745-253
Event that occurred to trigger the message.connected activated disconnected deactivated
Related Commands DescriptionCommand
Displays information on a DSPU packet.debug dspu packet
Displays information on DSPU FSM state changes.debug dspu state
Displays information on DSPU trace activity.debug dspu trace
Cisco IOS Debug Command Reference - Commands A through D662
debug decnet adj through debug dss ipx eventdebug dspu activation
debug dspu packetTo display information on a downstream physical unit (DSPU) packet, use the debugdspupacketcommandin privileged EXEC mode. To disable debugging output, use the no form of this command.
debug dspu packet [ name ]
no debug dspu packet [ name ]
Syntax Description (Optional) The host or PU name designation.name
Command Modes Privileged EXEC
Usage Guidelines The debugdspupacket command displays all DSPU packet data flowing through the router. To restrict theoutput to a specific host or physical unit (PU), include the host or PU name argument. You cannot turn offdebugging output for an individual PU if that PU has not been named in the debug dspu packet command.
Examples The following is sample output from thedebugdspupacket command:
Router# debug dspu packetDSPU: Rx: PU HOST3745 data length 12 data:
2D0003002BE16B80 000D0201DSPU: Tx: PU HOST3745 data length 25 data:
2D0000032BE1EB80 000D020100850000 000C060000010000 00DSPU: Rx: PU HOST3745 data length 12 data:
2D0004002BE26B80 000D0201DSPU: Tx: PU HOST3745 data length 25 data:
2D0000042BE2EB80 000D020100850000 000C060000010000 00The table below describes the significant fields shown in the display.
Table 79: debug dspu packet Field Descriptions
DescriptionField
Received frame (packet) from the remote PU to therouter PU.
DSPU: Rx:
Transmitted frame (packet) from the router PU to theremote PU.
DSPU: Tx:
Host name or PU associated with the transmit orreceive.
PU HOST3745
Number of bytes of data, followed by up to 128 bytesof displayed data.
data length 12 data:
Cisco IOS Debug Command Reference - Commands A through D 663
debug decnet adj through debug dss ipx eventdebug dspu packet
Related Commands DescriptionCommand
Displays debugging messages for DRiP packets.debug drip event
Displays information on DSPU FSM state changes.debug dspu state
Displays information on DSPU trace activity.debug dspu trace
Cisco IOS Debug Command Reference - Commands A through D664
debug decnet adj through debug dss ipx eventdebug dspu packet
debug dspu stateTo display information on downstream physical unit (DSPU) finite state machine (FSM) state changes, usethe debugdspustate command in privileged EXEC mode. To disable debugging output, use the no form ofthis command.
debug dspu state [ name ]
no debug dspu state [ name ]
Syntax Description (Optional) The host or physical unit (PU) namedesignation.
name
Command Modes Privileged EXEC
Usage Guidelines Use the debugdspustate command to display only the FSM state changes. To see all FSM activity, use thedebug dsputracecommand. You cannot turn off debugging output for an individual PU if that PU has notbeen named in the debugdspustate command.
Examples The following is sample output from the debugdspustate command. Not all intermediate numbers are shownfor the "activated" and "deactivated" logical unit (LU) address ranges.
Router# debug dspu stateDSPU: LS HOST3745: input=StartLs, Reset -> PendConOutDSPU: LS HOST3745: input=ReqOpn.Cnf, PendConOut -> XidDSPU: LS HOST3745: input=Connect.Ind, Xid -> ConnInDSPU: LS HOST3745: input=Connected.Ind, ConnIn -> ConnectedDSPU: PU HOST3745: input=Actpu, Reset -> ActiveDSPU: LU HOST3745-2: input=uActlu, Reset -> upLuActiveDSPU: LU HOST3745-3: input=uActlu, Reset -> upLuActive...DSPU: LU HOST3745-253: input=uActlu, Reset -> upLuActiveDSPU: LU HOST3745-254: input=uActlu, Reset -> upLuActiveDSPU: LS HOST3745: input=PuStopped, Connected -> PendDiscDSPU: LS HOST3745: input=Disc.Cnf, PendDisc -> PendCloseDSPU: LS HOST3745: input=Close.Cnf, PendClose -> ResetDSPU: PU HOST3745: input=T2ResetPu, Active -> ResetDSPU: LU HOST3745-2: input=uStopLu, upLuActive -> ResetDSPU: LU HOST3745-3: input=uStopLu, upLuActive -> Reset...DSPU: LU HOST3745-253: input=uStopLu, upLuActive -> ResetDSPU: LU HOST3745-254: input=uStopLu, upLuActive -> ResetThe table below describes the significant fields shown in the display.
Cisco IOS Debug Command Reference - Commands A through D 665
debug decnet adj through debug dss ipx eventdebug dspu state
Table 80: debug dspu state Field Descriptions
DescriptionField
Downstream PU debug message.DSPU
Link station (LS) event triggered the message.LS
PU event triggered the message.PU
LU event triggered the message.LU
Host name or PU name and LU address.HOST3745-253
Input received by the FSM.input=input,
Previous state and current new state as seen by theFSM.
previous-state, -> current-state
Related Commands DescriptionCommand
Displays debugging messages for DRiP packets.debug drip event
Displays information on DSPU packet.debug drip packet
Displays information on DSPU trace activity.debug dspu trace
Cisco IOS Debug Command Reference - Commands A through D666
debug decnet adj through debug dss ipx eventdebug dspu state
debug dspu traceTo display information on downstream physical unit (DSPU) trace activity, which includes all finite statemachine (FSM) activity, use the debugdsputrace command in privileged EXECmode. To disable debuggingoutput, use the no form of this command.
debug dspu trace [ name ]
no debug dspu trace [ name ]
Syntax Description (Optional) The host or physical unit (PU) namedesignation.
name
Command Modes Privileged EXEC
Usage Guidelines Use the debugdsputrace command to display all FSM state changes. To see FSM state changes only, use thedebugdspustate command. You cannot turn off debugging output for an individual PU if that PU has notbeen named in the debugdsputrace command.
Examples The following is sample output from the debugdsputrace command:
Router# debug dspu traceDSPU: LS HOST3745 input = 0 ->(1,a1)DSPU: LS HOST3745 input = 5 ->(5,a6)DSPU: LS HOST3745 input = 7 ->(5,a9)DSPU: LS HOST3745 input = 9 ->(5,a28)DSPU: LU HOST3745-2 in:0 s:0->(2,a1)DSPU: LS HOST3745 input = 19 ->(8,a20)DSPU: LS HOST3745 input = 18 ->(8,a17)DSPU: LU HOST3745-3 in:0 s:0->(2,a1)DSPU: LS HOST3745 input = 19 ->(8,a20)DSPU: LS HOST3745 input = 18 ->(8,a17)DSPU: LU HOST3745-252 in:0 s:0->(2,a1)DSPU: LS HOST3745 input = 19 ->(8,a20)DSPU: LS HOST3745 input = 18 ->(8,a17)DSPU: LU HOST3745-253 in:0 s:0->(2,a1)DSPU: LS HOST3745 input = 19 ->(8,a20)DSPU: LS HOST3745 input = 18 ->(8,a17)DSPU: LU HOST3745-254 in:0 s:0->(2,a1)DSPU: LS HOST3745 input = 19 ->(8,a20)The table below describes significant fields shown in the output.
Table 81: debug dspu trace Field Descriptions
DescriptionField
Time stamp.7:23:57
Downstream PU debug message.DSPU
Cisco IOS Debug Command Reference - Commands A through D 667
debug decnet adj through debug dss ipx eventdebug dspu trace
DescriptionField
Link station (LS) event triggered the message.LS
A PU event triggered the message.PU
LU event triggered the message.LU
Host name or PU name and LU address.HOST3745-253
String describing the following:
• input --LU FSM input
• state --Current FSM state
• new-state --New FSM state
• action --FSM action
in:inputs:state->(new-state, action)
String describing the following:
• input --PU or LS FSM input
• new-state --New PU or LS FSM state
• action --PU or LS FSM action
input=input ->
(new-state,action)
Related Commands DescriptionCommand
Displays debugging messages for DRiP packets.debug drip event
Displays information on DSPU packet.debug drip packet
Displays information on DSPU FSM state changes.debug dspu state
Cisco IOS Debug Command Reference - Commands A through D668
debug decnet adj through debug dss ipx eventdebug dspu trace
debug dss ipx eventTo display debugging messages for route change events that affect Internetwork Packet Exchange (IPX)Multilayer Switching (MLS), use the debugdssipxevent command in privileged EXEC mode. To disabledebugging output, use the no form of this command.
debug dss ipx event
no debug dss ipx event
Syntax Description This command has no arguments or keywords.
Command Default Debugging is not enabled.
Command Modes Privileged EXEC
Command History ModificationRelease
This command was introduced.12.0(5)T
This command was integrated into Cisco IOS Release 12.2(33)SRA.12.2(33)SRA
Examples The following is sample output from thedebugdssipxevent command:
Router#
debug dss ipx eventDSS IPX events debugging is onRouter# configure terminalEnter configuration commands, one per line. End with CNTL/Z.Router(config)# interface vlan 22Router(config-if)# ipx access-group 800 out05:51:36:DSS-feature:dss_ipxcache_version():idb:NULL, reason:42,prefix:0, mask:FFFFFFFF05:51:36:DSS-feature:dss_ipx_access_group():idb:Vlan2205:51:36:DSS-feature:dss_ipx_access_list()05:51:36:DSS-base 05:51:33.834 dss_ipx_invalidate_interface Vl2205:51:36:DSS-base 05:51:33.834 dss_set_ipx_flowmask_reg 205:51:36:%IPX mls flowmask transition from 1 to 2 due to new status ofsimple IPX access list on interfaces
Related Commands DescriptionCommand
Displays various MLS debugging elements.debug mls rp
Cisco IOS Debug Command Reference - Commands A through D 669
debug decnet adj through debug dss ipx eventdebug dss ipx event
Cisco IOS Debug Command Reference - Commands A through D670
debug decnet adj through debug dss ipx eventdebug dss ipx event